hived!! SO people can see how immature I
am and laugh. Just call me patch adams and those who
love me, call me captain jack arrrh!!
BTW The Lion the witch and the wardrobe is the best
movie since the matrix!
d.
--- InfoSecBOFH <[EMAIL PROTECTED]> wrote:
> On 12/7/05, Day Jay <[EMAIL PROTE
de of people sometimes. This
doesnt mean that I wouldnt seek them out at Defcon and
beat them down-physically.
d.
--- InfoSecBOFH <[EMAIL PROTECTED]> wrote:
> Now now Jason just because you got screwed by a
> company that sells
> registry hacks and offers no real value doesn'
Being unemployed is a lot harder than I thought. I
have too much time on my hands and that coupled with
misc. side jobs, I really would like to find someone
to work for that needs some helop. I'm looking to
hopefully work on site and not remotely unless
sometimes needed and hopefully have some sort
Here ye Here ye,
Someone hire me, I'm bored and like one enter key
could take the whole net down. 26, I could really use
a job-some corporate sponsership to help
consult/develop Etc.
Nothing wrong with keeping the internet for the people
by the people. Hey, whoever has to do it has to do it
and i
Dear All,
(First I am looking for a job in OC right now so if
you are looking for someone with knowledge like me,
send me an email. Eating is nice and I am poor
currently)
I highlighted an added sections as well as italicied
and underlined things to make it easier to absorb and
learn without havi
Stop the PRESS
GROUNDBREAKING
d4yj4y and Dorian have released a scientific ingenious
miracle or informational GOLD/Spirit to HELP THE HUMAN
RACE
ANti-Pscyh-Ops Etc. and PRO Will and Life!!
==CHUNG'S DONUT SHOP RELEASE=
The "Dorian Worm Theory: Future brightness"
refs: AI, ga
Stop the PRESS
GROUNDBREAKING
d4yj4y and Dorian have released a scientific ingenious
miracle or informational GOLD/Spirit to HELP THE HUMAN
RACE
ANti-Pscyh-Ops Etc. and PRO Will and Life!!
==CHUNG'S DONUT SHOP RELEASE=
The "Dorian Worm Theory: Future brightness"
refs: AI, ga
I'm sorry for being such a bastard. After looking more
into this guy's site, it looks pretty sweet.
d.
--- Day Jay <[EMAIL PROTECTED]> wrote:
> Jesus H. Christ!
>
> I never "claimed" to be a master at c coding or
> being
> the greatest like this guy di
No, it's hilarious!
--- Micheal Espinola Jr <[EMAIL PROTECTED]>
wrote:
> Is it just me, or is it hilarious that this
> "discussion" is generating
> sponsored links in Gmail for "World of Warcraft" ?
> ___
> Full-Disclosure - We believe in it.
> Charter:
AIL PROTECTED]>
wrote:
> i think him using the name "d4yj4y" on his code says
> enough about his
> status
>
> On May 9, 2005, at 8:46 AM, Steve Friedl wrote:
>
> > On Mon, May 09, 2005 at 08:38:10AM -0700, Day Jay
> wrote:
> >> I stole it, but it work
moderator, close this topic since all responses
to it have been off topic and displaying pure wannabes
angry at their own ability to find bugs or produce
something useful to the security community.
--- [EMAIL PROTECTED] wrote:
> On Mon, 09 May 2005 11:59:16 PDT, Day Jay said:
> > It wa
e
porn now.
--- [EMAIL PROTECTED] wrote:
> On Mon, 09 May 2005 11:22:46 PDT, Day Jay said:
> > I never "claimed" to be a master at c coding or
> being
> > the greatest like this guy did and he *still*
> > hardcoded his shit and he's probably still mad.
>
> No
ble to
apply black arts and instead clasp their theories and
what ifs still never knowing what it was like to hack"
--- [EMAIL PROTECTED] wrote:
> On Mon, 09 May 2005 10:09:59 PDT, Day Jay said:
> > We all saw how short the code was I had for that
> pwck
> > buffer overflow
give you.
Let's keep the ass-kissing to a min. pls kthxbye
--- [EMAIL PROTECTED] wrote:
> Day jay, you may find it fun to criticize those
> recognized by Microsoft, but let me remind you that
> Steve has done more to help computer security then
> you will ever dream of accomp
* where # is a NOP instruction, and "X" is the
exploit code. There
* must be a terminating NUL byte so the environment
processor does
* the right thing also.
*/
memset(egg, NOP, egglen);
memcpy(egg, "EGG=", 4);
// put our egg
ECTED]> wrote:
> On Fri, May 06, 2005 at 06:03:26PM -0700, Day Jay
> wrote:
> > //(PWCK is NOT SETUID) This isn't fake
> > //code I promise (it may be borrowed) ;) d4yj4y
>
> It may or may not be fake, but you are an
> *astonishingly* lame C programmer
Please teach me to be like you, I'm striving to be as
good as you Steve. You obviously are my master.
I bow to you.
Please teach me! Your code is sooo l33t!
--- Steve Friedl <[EMAIL PROTECTED]> wrote:
> On Mon, May 09, 2005 at 08:38:10AM -0700, Day Jay
> wrote:
> > I
I stole it, but it works, and that's all that matters
dickwad.
--- Steve Friedl <[EMAIL PROTECTED]> wrote:
> On Fri, May 06, 2005 at 06:03:26PM -0700, Day Jay
> wrote:
> > //(PWCK is NOT SETUID) This isn't fake
> > //code I promise (it may be borrowed) ;) d4yj
snip
//Chung's Donut Shop release !!
//Redhat/Suse PWCK Buffer overflow POC Code
//(PWCK is NOT SETUID) This isn't fake
//code I promise (it may be borrowed) ;) d4yj4y
#include
char shellcode[] =
"\x31\xc0\xb0\x46\x31\xdb\x31\xc9\xcd\x80\xeb\x16\x5b\x31\xc0"
"\x88\x43\x07\x89\x5b\x08\x
That's gotta be the most half assed piece of code
offered as something for spyware I've ever seen! All
of the directories are like hardcoded and statically
linked! that is no where near any spyware
sophistication I have seen in windows spyware
programs.
d
--- khaalel <[EMAIL PROTECTED]> wrote:
> S
please send me the LERG :) thanx
--- vulcanius <[EMAIL PROTECTED]> wrote:
> Heh. I don't think it's off topic at all, after all
> were just
> disclosing information.
>
> KF, your absolutely right. The lack of regulation
> and the lack of
> attention people give to it is atrocious. You would
> thi
Don't quit your day job
--- Enune <[EMAIL PROTECTED]> wrote:
> G'day again all,
>
> Just thought I'd throw in a morning laugh.. Enjoy :)
>
>
> Advisory Name: Buffer overflow in BitKeeper
> screenshot may lead to bad PR
> Date: 04/05/2005
> Severity: Rabbit.
>
> Description:
> There is a buffer
Man, ppl are such crybabies!
--- Paul Schmehl <[EMAIL PROTECTED]> wrote:
> --On Tuesday, April 26, 2005 03:05:29 PM -0400 Stan
> Bubrouski
> <[EMAIL PROTECTED]> wrote:
>
> > Could we can the nazi rhetoric in messages on this
> list? Or can we just
> > complain until the list
> > loses its hosti
I think it's a whole lot of trouble to the newbie
beginners who probably ran it the first time.
Lamers. Heh.
--- bkfsec <[EMAIL PROTECTED]> wrote:
> Steve Friedl wrote:
>
> >On Wed, Apr 20, 2005 at 05:35:56PM -0700, Day Jay
> wrote:
> >
> >
> >&g
Kind of like your attempt to be American :)
--- Javi Polo <[EMAIL PROTECTED]> wrote:
> On Apr/20/2005, Day Jay wrote:
>
> > You are wrong again, it's "Smashing the Stick" you
> > moron. Not smashing the stack. Ask anyone here!
> > Man, you are such
not as lame as you are! Take your ham and shove it!
What a faggit.
--- Ed Carp <[EMAIL PROTECTED]> wrote:
> Javi Polo wrote:
>
> > On Apr/20/2005, Day Jay wrote:
> >
> >>You are wrong again, it's "Smashing the Stick" you
> >>moron. Not s
n McGuire
>
>
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]
> On Behalf Of Day Jay
> Sent: Wednesday, April 20, 2005 5:09 PM
> To: vulcanius
> Cc: full-disclosure@lists.grok.org.uk
> Subject: Re: [Full-disclosure] FIXED CODE - IIS
e when everyone
> already knows it's a lame backdoor attempt?
>
> On 4/20/05, Day Jay <[EMAIL PROTECTED]> wrote:
> > Yes it is you hat squad lammer newbie. Now get it
> to
> > work!! You fucking newbie.
> >
> > You're so lame and so is your file
; class101
> Jr. Researcher
> Hat-Squad.com
>
-
> - Original Message -
> From: "Day Jay" <[EMAIL PROTECTED]>
> To:
> Sent: Wednesday, April 20, 2005 8:15 PM
> Subject: [Full-disclosure] FIXED CO
e are you?
--- dk <[EMAIL PROTECTED]> wrote:
> Day Jay wrote:
> > Sorry, the previous code was broken.
>
> Definitely `borken'... I didn't even see one
> /etc/passwd file in here!
> Less obvious calls may catch more habitual FD code
> runners next time
Sorry, the previous code was broken. This code should
work...
Happy Owning!! :)
=SNIP
/* Proof of concept code
Please don't send us e-mails
asking us "how to hack" because
we will be forced to skullfsck you.
DISCLAIMER:
!!NOT RESPONSIBLE WITH YOUR USE OF THIS
/* Proof of concept code
Please don't send us e-mails
asking us "how to hack" because
we will be forced to skullfsck you.
DISCLAIMER:
!!NOT RESPONSIBLE WITH YOUR USE OF THIS CODE!!
IIS 6 Buffer Overflow Exploit
BUG: inetinfo.exe improperly bound checks
http requests sent longer
d34r c0rr41 r33f,
1 r3411y 4m 50 4nn0y3d 70 7h3 3x7r3m3. 1 r3411y 4m 50
4nn0y3d 7h47 N7P w0u1d 74k3 7h3 71m3 70 wr173 4 14m3
3m411 70 3v3ry0n3 11k3 7h47 b3c4u53 1337 5p34k 5h0u1d
0n1y b3 r34d b13 7h4 31337 0n1y 0n 53cr37 b4kch4nn315
U c0ck5uck3r.
1n 411 f41rn355 7h0u64, 1 d0 h4v3 70 54y 7h47 1 4m
d34r c0rr41 r33f,
1 r3411y 4m 50 4nn0y3d 70 7h3 3x7r3m3. 1 r3411y 4m 50
4nn0y3d 7h47 N7P w0u1d 74k3 7h3 71m3 70 wr173 4 14m3
3m411 70 3v3ry0n3 11k3 7h47 b3c4u53 1337 5p34k 5h0u1d
0n1y b3 r34d b13 7h4 31337 0n1y 0n 53cr37 b4kch4nn315
U c0ck5uck3r.
1n 411 f41rn355 7h0u64, 1 d0 h4v3 70 54y 7h47 1 4m
d34r c0rr41 r33f,
1 r3411y 4m 50 4nn0y3d 70 7h3 3x7r3m3. 1 r3411y 4m 50
4nn0y3d 7h47 N7P w0u1d 74k3 7h3 71m3 70 wr173 4 14m3
3m411 70 3v3ry0n3 11k3 7h47 b3c4u53 1337 5p34k 5h0u1d
0n1y b3 r34d b13 7h4 31337 0n1y 0n 53cr37 b4kch4nn315
U c0ck5uck3r.
1n 411 f41rn355 7h0u64, 1 d0 h4v3 70 54y 7h47 1 4m
Chung's Donut Shop Release!
=
Metaphoric Linguistical Communication Protocol
By d4yj4y
In today's society communication is critical and what
might be considered private or personal communication
seems crippled by the fear of eavesdroppers so I
thought I would release a
Chung's Donut Shop Release!
=
Metaphoric Linguistical Communication Protocol
By d4yj4y
In today's society communication is critical and what
might be considered private or personal communication
seems crippled by the fear of eavesdroppers so I
thought I would release a
37 matches
Mail list logo