-- Forwarded message --
From: worried security [EMAIL PROTECTED]
Date: Dec 21, 2007 9:40 AM
Subject: Re: Chat with Dude VanWinkle
To: Dude VanWinkle [EMAIL PROTECTED]
On Dec 20, 2007 4:43 AM, Dude VanWinkle [EMAIL PROTECTED] wrote:
These messages were sent while you were
On Dec 20, 2007 7:19 PM, SecReview [EMAIL PROTECTED] wrote:
1.) What are your qualifications for reviewing these companies?
We are a team of security professionals that have been performing a
wide array of penetration tests, vulnerability assessments, web
application security services etc.
On Dec 21, 2007 11:05 AM, php0t [EMAIL PROTECTED] wrote:
We're made up of: online news
journalists, corporate security, government security, military
defense, intelligence service, law inforcement and freelance ethical
hackers.
You are one of the most delusional people I have ever
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
So, because I disagree strongly with your actions I must be the
subject of your review?
Clearly, your progenitors were swimming in the shallow end of the
gene pool when they set about screwing your sorry excuse for a
brain into existence.
You
Yes we are an easy
target for php0t etc right now, but in the future we will be the
biggest on the internet in the long term.
I didn't know 'being targetted' means somebody replies to one of your mails
(OFF LIST!) to express an opinion. What is going to change about this in the
long term?
I believe the BackTrack guys get some of it and put the rest back
into Offensive Security. See http://www.remote-
exploit.org/news.html, June 07.
Elazar
On Thu, 20 Dec 2007 20:02:03 -0500 Matthew Hall [EMAIL PROTECTED]
wrote:
gmaggro wrote:
..it would be a nice touch if everyone sent a few
PaulM:
You'd be right only if you weren't wrong. That being said, we're
not going to talk to the trolls any more. While it might be amusing
it's a waste of our time, and our readers time.
We will continue to write reviews and will continue to be as honest
and truthful as possible during our
Unless I missed something, these seemed like legitimate responses. They may
not have all been delivered with tact, but I mean, you are on FD, what did
you expect?
I think some valid points are brought up about your credentials and your
process.
Nate
On 12/21/07, SecReview [EMAIL PROTECTED]
I believe your answers are definitely more trollish and kiddie-like
than the legitimate responses, despite the aggressive or tactless
comments, as Nate mentioned.
___
Full-Disclosure - We believe in it.
Charter:
I agree with Nate. It's odd how you dismiss any critics as 'trolls,' and
only believe that people who compliment your efforts are 'legitimate
readers.' As an author and public speaker I know that I get the most value
from people who critique my work because they help me to improve. Sure,
being
On Dec 21, 2007 1:11 PM, worried security
[EMAIL PROTECTED] wrote:
On Dec 21, 2007 11:05 AM, php0t [EMAIL PROTECTED] wrote:
We're made up of: online news
journalists, corporate security, government security, military
defense, intelligence service, law inforcement and freelance ethical
###
Luigi Auriemma
Application: WinUAE
http://www.winuae.net
Versions: = 1.4.4
Platforms:Windows
Bug: buffer-overflow
Exploitation: local
Date: 21 Dec 2007
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Title: [CAID 35970]: CA Products That Embed Ingres Authentication
Vulnerability
CA Vuln ID (CAID): 35970
CA Advisory Date: 2007-12-19
Reported By: Ingres Corporation
Impact: Attacker can gain elevated privileges.
Summary: A potential
Sorry for the brief post but Im still able to bypass filters that aol has
put in place. So again with frustration I come to FD to imply pressure on a
company to patch correct. From reading feedback from AOL they feel the
vulnerability is put to bed and requires no more attention.
I am not
All,
I read a paper last night titled The Geometry of Innocent Flesh on the Bone
(http://www.cse.ucsd.edu/~hovav/). It described a technique similar to
return-into-libc. The utility I'm attaching (hikaru) implements an automated
binary analysis to determine possible instructions (gadgets,
It would help if I attached the file wouldn't it?
- Ben
All,
I read a paper last night titled The Geometry of Innocent Flesh on the Bone
(http://www.cse.ucsd.edu/~hovav/).
It described a technique similar to return-into-libc. The utility I'm
attaching (hikaru) implements an automated
On Dec 21, 2007 5:36 PM, Ben [EMAIL PROTECTED] wrote:
All,
I read a paper last night titled The Geometry of Innocent Flesh on the Bone
(http://www.cse.ucsd.edu/~hovav/). It described a technique similar to
return-into-libc.
yes, this is fun stuff :)
'''
Our thesis: In any sufficiently
On Fri, 21 Dec 2007 13:11:22 GMT, worried security said:
In 5 to 10 years n3td3v should be an elite force of people from
corporate,government,military,intelligence,law and freelance ethical
hackers that is way bigger than any other group on the internet.
The only problem is that the talent
18 matches
Mail list logo