Hello Full Disclosure Hysterics Friends,
I have now read through five dozen complaints about how Ubuntu
is fundamentally an unsecure operating system, filled with more holes
than Swiss cheese.
If somebody could direct me toward a local root exploit against a fully
up-to-date Ubuntu 11.04 or
Jason has a good point. Now to make a simple statement - I am not (nor was
I) agreeing with the Ubuntu bashing in this, merely stating a point that it
puts user friendliness over security AT TIMES. I only switched distro for I
had... Disagreements... with Ubuntu's Wireless stack in installations
Oh thank god, this thread has now become a case of 'look how big my penis
will be in x amount of months'.
On Mon, Nov 21, 2011 at 12:24 PM, Darren Martyn
d.martyn.fulldisclos...@gmail.com wrote:
Jason has a good point. Now to make a simple statement - I am not (nor was
I) agreeing with the
If that was aimed at me, I was merely making an example for people like xD.
Seriously. If you want to bitch about an OS, LEARN about it. Look at it
from the INSIDE. Set yourself GOALS.
I know an guy who wanted to know as much as he could about Win32, and even
though I consider him an expert on it
On Mon, 21 Nov 2011 12:24:03 GMT, Darren Martyn said:
1) Read the latest kernels source over a long period of time, looking for
bugs and to get a better understanding of how it works on that level
Just keep in mind that you will never finish reading the kernel source, as it's
currently sitting
Valdis - I did not know the source had gotten THAT big, still, will be
interesting to explore parts of it that interest me - the TCP stack for a
start... Also, thanks for the advice on the book :)
Good point on the difficulty of mantaining my own distro - I realize I
would need a fair few people
I don't believe you.
Have fun seeking attention,
Leon
--
Leon Kaiser - Head of GNAA Public Relations -
litera...@gnaa.eu || litera...@goatse.fr
http://gnaa.eu || http://security.goatse.fr
7BEECD8D FCBED526
And neither does the Internet. Even if you do, in fact, have even a
single XSS exploit.
Yours,
Leon
--
Leon Kaiser - Head of GNAA Public Relations -
litera...@gnaa.eu || litera...@goatse.fr
http://gnaa.eu ||
I'm not asking you to give me it. I don't want it. Yet you refuse to
demonstrate it or flex in the slightest bit. From what I've seen on this
list, you are nothing but full of shit. You do have to proove crap if
you are so full of it that it's spilling out of your ass.
Enjoy your elitist outlook
Since when does GNAA claim to have things and then refuse to prove said
claims?
Yours,
Leon
--
Leon Kaiser - Head of GNAA Public Relations -
litera...@gnaa.eu || litera...@goatse.fr
http://gnaa.eu ||
Yes, because asking you to prove a dubious assertion constitutes
elitism.
See a doctor, before you hurt someone that you love,
Leon
--
Leon Kaiser - Head of GNAA Public Relations -
litera...@gnaa.eu || litera...@goatse.fr
Your use of the royal we is rather disturbing. Does your shrink know
you use it? When making claims about my organization, please use
coherent grammar so I can ascertain what you are attempting to convey.
Yours,
Leon
--
Leon Kaiser -
GNAA isn't using any exploits. Nice IRC scripts you got there, kiddo.
Leon
--
Leon Kaiser - Head of GNAA Public Relations -
litera...@gnaa.eu || litera...@goatse.fr
http://gnaa.eu || http://security.goatse.fr
I don't want your exploit. I just want you to demonstrate that you have
one. You're full of shit, and refuse to do anything to prove otherwise.
Also, what is your first language? It clearly isn't English...
Leon
--
Leon Kaiser - Head
Attention sirs,
xD 0x41 has just admitted to me that he does not, in fact, have any zero
day exploits. As he was too much of a pussy to post it to F-D, I shall
do it for him.
--
Leon Kaiser - Head of GNAA Public Relations -
CarolinaCon-8/2012 - Call for Papers/Presenters/Speakers
h4x0rs, InfoSec professionals, international spies, script kidz, and posers,
CarolinaCon-8 will occur on May 11th-13th 2012 in Raleigh NC (USA). We are now
officially accepting speaker/paper/demo submissions for the event.
If you
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2011:177
http://www.mandriva.com/security/
On Mon, 21 Nov 2011 14:12:38 GMT, Darren Martyn said:
Valdis - I did not know the source had gotten THAT big, still, will be
interesting to explore parts of it that interest me - the TCP stack for a
start... Also, thanks for the advice on the book :)
As of this morning, Linus's git tree had:
On Mon, Nov 21, 2011 at 9:58 AM, valdis.kletni...@vt.edu wrote:
On Mon, 21 Nov 2011 14:12:38 GMT, Darren Martyn said:
Valdis - I did not know the source had gotten THAT big, still, will be
interesting to explore parts of it that interest me - the TCP stack for a
start... Also, thanks for
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2351-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
November 21, 2011
On Mon, 21 Nov 2011 10:03:21 PST, Dan Kaminsky said:
15.3M lines of code != 15.3M lines of code in use on any one system !=
15.3M lines of code that can ever involve a security boundary.
Yes, but the vast majority of it is on use on *some* system (heck, there's still
code in there to support
Gents,
Feel free to read US-CERT VU#584363 related to our recents 0days
allowing skilled attackers to take the complete control of a fleet of
GSM/Tablets (Symbian, iPhone/iPad, BlackBerry, Windows Mobile, Android,
etc), thanks to vulnerabilities in Mobile Device Management (MDM).
This could
On Wed, Nov 09, 2011 at 10:42:01AM +0100, muuratsalo experimental hack lab
wrote:
LabWiki = 1.1 Multiple Vulnerabilities
author:
Well, i will give u an example when my website is up.. this is sad to,
as i rewrote econet exploit, and named it quarter-nelson.c ,now this
has been rooting your damn Ubuntus, for months.. and, it is a modified
version, and public. sorry but, thats just, 3 boxes i tested *today*
of different
ye, it has been there for what, 4months... anyhow, i dun care much for
the website.. so better it stays down, less apm for me =d
byez
On 22 November 2011 14:27, Matthew Harlum secli...@cactuar.net wrote:
On 22/11/11 2:16 PM, xD 0x41 wrote:
quarter-nelson.c ... yes, the code is there, when
DUDE...!!
dud..fuck this,
DUDE THAT WAS PATCHED LIKE TWO YEARS AGO
On 11/22/2011 12:33 AM, xD 0x41 wrote:
ye, it has been there for what, 4months... anyhow, i dun care much for
the website.. so better it stays down, less apm for me =d
byez
On 22 November 2011 14:27, Matthew Harlum
no really whats most interesting about you, is your botnet your
running, from the isp.
i wonder if your the boss.. or just, using a bosslike nick... either
way, dont expect it to last much longer, isp owner or not, your doing
the wrong thing.
and yes i rooted you, 10x now, and more boxes will
and yeas, that was indeed me on the phone, go ask your boss how it
went.. err, maybe not :)
hehe..
On 22 November 2011 18:21, xD 0x41 sec...@gmail.com wrote:
no really whats most interesting about you, is your botnet your
running, from the isp.
i wonder if your the boss.. or just, using a
You fucking pieces of shit forget when it was once me who was asking,
for help in regards to mutiple things, and when offered NONE, in
regards to code i later had to find thanks to fucking blakhatz, why
the fuck would i want or care for this list now, forget any
competition i ever started, you
29 matches
Mail list logo