I know that Kingcope does nice jobs, I follow you some times ago and I
found that your exploits are simply awesome.
hope that you continue in that way =)
Regards,
On Fri, Aug 9, 2013 at 12:21 PM, R. Whitney wrote:
> I would concern myself more with the web hosting providers which utilize
> su
There are many ISP that route IP traffic through networks with private
addresses, my ISP to do the same thing and has 10.0.0.0 class A addresses
routable.
May be it is a miss of IP addresses or may be a NAT that was published due
to some network need.
regards,
On Fri, May 17, 2013 at 8:08 PM, ky
I was working on a backdoor kernel land, using netfilter =]
Kind regards,
On Wed, Feb 8, 2012 at 10:17 PM, Levent Kayan wrote:
> On 02/08/12 22:55, Kryton Jones wrote:
> > Is this something like Port Knocking ??
> you can see that kinda as port knocking yes.
>
> >
> > http://en.wikipedia.org/w
Is there any version that support https ?
2009/2/8 seclists
> Thx for your kind help,bro.
>
> The jsp version of reDuh is powerful, so cool.
>
> 在2009-02-08 07:39:41,"Haroon Meer" 写道:
> >Hi..
> >
> >* seclists [secli...@126.com] seemed to say:
> >> Hi,bro
> >> Thx For shareing reDuh. I ha
it's worked on 2.6.35.7, nice exploit
On Wed, Dec 8, 2010 at 6:09 AM, Rem7ter wrote:
> Why gcc exp.c -o exp alert "Error: too many Argument"? I test it in Linux
> 2.6.X.
>
> 2010/12/7 coderman
>
> On Tue, Dec 7, 2010 at 12:25 PM, Dan Rosenberg
>> wrote:
>> > ... I've included here a proof-of-
Hello,
Please can communicate the repository of your tool
On Sat, Oct 23, 2010 at 2:12 PM, wrote:
> Hi, this tool is alternative to Hydras´s. It is based on NiX Proxy
> Checker. Here´s the page for development status:
> http://myproxylists.com/nix-brute-force
>
> The tool will be freeware and I
I agree, it is not a very useful bug
On Fri, Sep 10, 2010 at 8:48 PM, wrote:
> On Fri, 10 Sep 2010 16:32:16 EDT, musnt live said:
> > c:\nmap -sSV -P0 c:\win95\system\nmap.exe
> > # ./nmap -sSV -P0 /usr/speling/Собака/bin/nmap
>
> That's not a vulnerability, that's a fucktard who's running secur
Check mirror website :
http://packetstormsecurity.nl/
http://packetstorm.linuxsecurity.com/
On Tue, Jun 22, 2010 at 4:20 PM, wrote:
> Anyone know what happen to packetstorm.org
>
> The site is down!
>
>
>
>
> James Smith
> Email: ja...@smithwaysecurity.com
> Website: www.smithwaysecurity.com
I got a tweet today about a Nice and real message in the last update IANA"
for .PS",
http://www.iana.org/domains/root/db/ps.html
Hope that this information will merge quickly and update all *Brainstorming
routines.
*Best regards,
--
Ali MEZGANI
Network Engineering/Security
http://securfox.wordpr
Hello,
Yep, very nice idea, so the big job is done, what about an automated scan
even a new release ?
I think that you must keep an cron eyes on.
Great job,
On Fri, Jan 29, 2010 at 10:30 PM, wrote:
> Hi List,
>
> I just posted a document on fingerprinting web applications where I show
> some i
Hello,
You may do that with u32 module of iptables.
2010/1/28 김무성
> Hello list
>
>
>
> Can I manipulate packet’s specific field using Squid (transparent proxy)?
>
>
>
> KIM
>
>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.gr
Yes i like what you say, and many times i said that when some friends ask me
what i am doing,.
Well my reply was i'm playing piano :)
On Thu, Jul 30, 2009 at 7:01 PM, Peter Bruderer wrote:
> Programming is like playing Piano: Just press the right key at the
> right time in the right order with t
Hello,
Well, the blocklist of IPv4 address is (0.0.0.0 - 255.255.255.255),
and the IPv4 defines many classes A,B,C,D,E, the address 255.255.255.255
reside in class E (240.0.0.0 - 255.255.255.255)
and that class should not be used on IP networks. it's just for experimental
purpose.
Anyway, the ad
13 matches
Mail list logo