afk-47 is the tool
don't make act the motherfuckin fool
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
i know who n3td3v is : HE'S JUST A GAY and maybe fat
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Mar 03 23:00:49 worried then non-us hackers will stop posting
to mailing lsits
you will stop posting php include exploit ?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and
moi je veut bien jouer au tarot avec lise
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
is it real ?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
n3td3v here it's Full Disclosure, not a gay tv serie fan mailing list
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
there isn't an RFI ...
where is the vuln ?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
medical research is lame.
humans are the virus of this planet
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
yeah that's right.
Maybe the real question is, if they don't know how secure an int overflow in
imageop module, maybe other modules are vulns too.
I think nobody really take the time to audit python source code, when i
found the vuln in ten minutes just for proof to a friend that's python isn't
ho
for(int i=0; i rand(); i++)
send(sd, , strlen(), 0);
do you understand what's lame in this code ?
The possibilitie of an infinite loop, but ok very very very low chance
that's appear
___
Full-Disclosure - We believe in it.
Charter:
The module imageop contains a lots of int overflow, which result in heap
overflow, and maybe memory dump.
The files imageop.c and rbgimgmodule.c are examples.
static PyObject *
imageop_tovideo(PyObject *self, PyObject *args)
{
int maxx, maxy, x, y, len;
/*
you're too bitch for understanding i joke
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
i need your name and your address, i will sell it to the police. :P
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
fun
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
the backdoor is named python
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
really we don't care
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
secret story http://secretstory.ath.cx/
http://secretstory.ath.cx/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
we don't care
On 6/29/07, Tonu Samuel [EMAIL PROTECTED] wrote:
http://www.foia.cia.gov/browse_docs_full.asp?title=foobar%3Cimg%
20style='position:absolute;top:10px;left:100px;'%20%
20src=http://hosto.ru/znako/ban-prost.gif%3E
BTW, f**k you who publish hashes. If you have nothing to publish,
i saw that in functions_post.php :
if (!defined http://www.phpbb.de/doku/xref/_functions/defined.html('IN_PHPBB
http://www.phpbb.de/doku/xref/_constants/IN_PHPBB.html'))
{
die('Hacking attempt');
}
so this RFI can't work
___
Full-Disclosure -
yeah spam is fun, the proof : http://pornmaster.ath.cx/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
we don't give a fuck of you're fucking fascits movement
stop spaming your shit here
as well as hackers taking up the cause
in Canada, China and Poland
shame on their
___
Full-Disclosure - We believe in it.
Charter:
maybe you will understand you just are a fachiste crew
nobody will follow you
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
sorry the good url is *
http://www.Php-exploit.info/index.php?id=3407com=#onlythecrimepaid*
On 3/4/07, Slythers Bro [EMAIL PROTECTED] wrote:
i breaked md5
i used an evolued quantic atomic librairie for recompuation
where i compress the quantic flow : and reduce the quantic recomputation
time
hi,
sorry but i know nothing about the real physical quantic theory
i'am not a physician
i just know there are 3 states : 0 ,1 and unknow
How? In what way? look in the .rar
i used this lib for coding fuckmd5.cpp
You did? I can't see any sign of tri-state logic in the final source
code.
ok
ia 32 bits pocpoc = Proof Of ConceptOn 10/18/06, Josh Bressers
[EMAIL PROTECTED] wrote: ?print_r(unserialize('a:1073741823:{i:0;s:30:aa}'));
? in function zend_hash_init() int overflow ( ecalloc() )- heap overflow here segfault in zend_hash_find() but it's possible to
? print_r(unserialize('a:1073741823:{i:0;s:30:aa}'));?in function zend_hash_init() int overflow ( ecalloc() )- heap overflowhere segfault in zend_hash_find() but it's possible to fake the bucket and exploit a zend_hash_del_index_or_key
i tried a memory dump , just fake
/*MD5 recomputation proof of conceptcoded by overdose[EMAIL PROTECTED]maybe need modification for big endianbcc32 -O2 -6 fuckmd5.cpp
E:\UnxUtils\usr\local\wbincat t.txt dcvgc E:\UnxUtils\usr\local\wbinmd5sum.exe t.txt1c66bd6cc55e538103360ae67e5291c9 *t.txt
E:\UnxUtils\usr\local\wbin
when you don't know 4 first bytes in a md5 hash bf,it's possible to recompute the round 4 of md5 and brute force faster this 4 bytes i joined my sources
http://dl-1.free.fr/52616e646f6d49561f7cfe449ea5eb99f8ecdf3675769b5029b9b9d2d5efaa09/FUCKMD5.rarsee in test.cpp and md5bf.cpp
you exploit a memory leak when sql password is loaded by PHP script
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
?php $host = 127.0.0.1; $user = sqluser; $pass = sqlpass;. $foobar=html_entity_decode($_GET['foo']);
echo $foobar;?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by
this troll is for autist
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
31 matches
Mail list logo