[Full-Disclosure] VERY HIGH VULNERABILITY DISCLOSURE !!! MASS ROOT POSSIBLE !!!
This mail was a fake again : http://lists.netsys.com/pipermail/full-disclosure/2004-July/023409.html I suppose those mails are made by a team named No.Disclosure. I'm sorry for them. bye Germain Randaxhe aka [EMAIL PROTECTED] _ A la recherche d'un taux plus intéressant? http://money.fr.msn.be/ ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Fw: [Full-Disclosure] ANOTHER 3L33T3 ADVISO AND NOT ON PHP-CASTOR 10.3 BETA (used by 3 peoples on internet) !!! 0DAY EXPLOIT !
This advisory was of course not written by me, it's a fake. Bye Germain Randaxhe aka [EMAIL PROTECTED] - Original Message - From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Monday, July 05, 2004 9:20 PM Subject: [Full-Disclosure] ANOTHER 3L33T3 ADVISO AND NOT ON PHP-CASTOR 10.3 BETA (used by 3 peoples on internet) !!! 0DAY EXPLOIT ! This is IHCTEAM material. We fuck blackhats and we own the planet. This is a leet advisory, s0 l33t. Just read it and be quiet. --- IHC TEAM private work, all the fame become to IHC TEAM and the leetest mr. [EMAIL PROTECTED] Product: PHP Version: all Security level: Very high baby !!! What's the problem ? == There is a BIG 1337 BUG 0day in all the php versions for ever never. This bug is caused by the system() function. This is a very VERY 3v1l backdoor, that allows execution of arbitrary shell command. This backdoor has been coded by ZyXyS from HACK3R c0rp0r4ti0n (c) (TM) (R). Because we want fame, we'll explain you da bug: l00k at th1s 3v1l code: ? system($cmd); ? *TAD* ! If this code is on a webserver, a malicious user (like ZyXyS) can exec EVERYTHING and own EVERYWHERE. Example: www.thc-is-lame.org/page.php?cmd=ls%20/tmp It will give you: tmp-shells-owned-with-THC-Hydra-fucking-lame-kiddy-tool.txt adore.tar.gz last-10-leaked-exploits.tar.gz You see, you can rock. So, at this point we can see that ZyXyS is a very leet guy: THIS BACKDOOR is less detectable than a LKM BACKDOOR like adore.tar.gz (--- hahaha). I release this vulnerability because the K-otik team (www.k-otik.com) owned ZyXyS 10 days ago (after the fbi) and discovered the backdoor, and k-otik wanted to write an advisory, ONLY FOR FAME AND MONEY. I want this fame (but for the money, I don't mind, I am rich because I sell 0day, traded on #darknet, to idefense), so I had to release the bug before K-otik. k-otik is like hack.co.za, they release everything and nothing, but they can't code their own exploit. Greets: == Rudolf Polzer ([EMAIL PROTECTED]): Thank to his idea to disclose this bug and if you have another idea for us mail me packetstormsecurity: they give us kiddie-friendly exploits and mass rooters spender: he sells good security patches isec: now my grandmother can r00t linux boxes bugtraq: they leak bugs found by ugly blackhats, which worked a lot of time to discover them espionet guys: they represented very well the hacker scene in a TV show with their netbus (please don't open my cdrom device guys) Fame: We already owned everyone and everything with these exploits years ago, and in fact we've all had them sitting on the shelf gathering dust due to lack of new targets. FUN TESTED IDEAS: www.team-teso.net (down because of us) www.thc.org (haha owned 10 times) www.securityfocus.com It was very funny to read .gov and .mil files. WARNING !!! /!\ WE ARE LOOKING FOR A JOB IN THE SECURITY RESEARCH /!\ Visit us: www.ihcteam.com www.newffr.com www.espionet.net www.underground-fr.org www.phpsecure.com --- We n33d f4me, m0n3y, g1rls and m0nk3ys, so VIVA EL DISCLOSURO. [EMAIL PROTECTED] _ A la recherche d'un taux plus intéressant? http://money.fr.msn.be/ ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Fw: [Full-Disclosure] ANOTHER 3L33T3 ADVISO AND NOT ON PHP-CASTOR 10.3 BETA (used by 3 peoples on internet) !!! 0DAY EXPLOIT !
This advisory was not written by me. It's a fake. bye [EMAIL PROTECTED] - Original Message - From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Monday, July 05, 2004 9:20 PM Subject: [Full-Disclosure] ANOTHER 3L33T3 ADVISO AND NOT ON PHP-CASTOR 10.3 BETA (used by 3 peoples on internet) !!! 0DAY EXPLOIT ! This is IHCTEAM material. We fuck blackhats and we own the planet. This is a leet advisory, s0 l33t. Just read it and be quiet. --- IHC TEAM private work, all the fame become to IHC TEAM and the leetest mr. [EMAIL PROTECTED] Product: PHP Version: all Security level: Very high baby !!! What's the problem ? == There is a BIG 1337 BUG 0day in all the php versions for ever never. This bug is caused by the system() function. This is a very VERY 3v1l backdoor, that allows execution of arbitrary shell command. This backdoor has been coded by ZyXyS from HACK3R c0rp0r4ti0n (c) (TM) (R). Because we want fame, we'll explain you da bug: l00k at th1s 3v1l code: ? system($cmd); ? *TAD* ! If this code is on a webserver, a malicious user (like ZyXyS) can exec EVERYTHING and own EVERYWHERE. Example: www.thc-is-lame.org/page.php?cmd=ls%20/tmp It will give you: tmp-shells-owned-with-THC-Hydra-fucking-lame-kiddy-tool.txt adore.tar.gz last-10-leaked-exploits.tar.gz You see, you can rock. So, at this point we can see that ZyXyS is a very leet guy: THIS BACKDOOR is less detectable than a LKM BACKDOOR like adore.tar.gz (--- hahaha). I release this vulnerability because the K-otik team (www.k-otik.com) owned ZyXyS 10 days ago (after the fbi) and discovered the backdoor, and k-otik wanted to write an advisory, ONLY FOR FAME AND MONEY. I want this fame (but for the money, I don't mind, I am rich because I sell 0day, traded on #darknet, to idefense), so I had to release the bug before K-otik. k-otik is like hack.co.za, they release everything and nothing, but they can't code their own exploit. Greets: == Rudolf Polzer ([EMAIL PROTECTED]): Thank to his idea to disclose this bug and if you have another idea for us mail me packetstormsecurity: they give us kiddie-friendly exploits and mass rooters spender: he sells good security patches isec: now my grandmother can r00t linux boxes bugtraq: they leak bugs found by ugly blackhats, which worked a lot of time to discover them espionet guys: they represented very well the hacker scene in a TV show with their netbus (please don't open my cdrom device guys) Fame: We already owned everyone and everything with these exploits years ago, and in fact we've all had them sitting on the shelf gathering dust due to lack of new targets. FUN TESTED IDEAS: www.team-teso.net (down because of us) www.thc.org (haha owned 10 times) www.securityfocus.com It was very funny to read .gov and .mil files. WARNING !!! /!\ WE ARE LOOKING FOR A JOB IN THE SECURITY RESEARCH /!\ Visit us: www.ihcteam.com www.newffr.com www.espionet.net www.underground-fr.org www.phpsecure.com --- We n33d f4me, m0n3y, g1rls and m0nk3ys, so VIVA EL DISCLOSURO. [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html _ Des centaines de jobs de rêve on-line. http://www.fr.msn.be/job/ ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html