Re: [Full-disclosure] Beware trojaned exploits!

2005-07-27 Thread str0ke
/* we all know that you are a stupid backd00r spreader str0ke ;)) */ I always come thru the fr0ntd00r :P On another note anyone have access to dikline.com's sine? I want to read [frsirtg0.txt] 07-21-05 [ 33067] [/home/frsirt/www] [june] [fucking gotcha!] /str0ke

Re: [Full-disclosure] Beware trojaned exploits!

2005-07-27 Thread [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 we all know that you are a stupid backd00r spreader str0ke ;)) At 08:10 27/07/05, [EMAIL PROTECTED] wrote: /* Hmm, I'm noticing a pattern. Warning: don't download exploits from any sites that have an 'o' replaced with a '0'! The 0 obviously makes

Re: [Full-disclosure] Beware trojaned exploits!

2005-07-27 Thread str0ke
/* Hmm, I'm noticing a pattern. Warning: don't download exploits from any sites that have an 'o' replaced with a '0'! The 0 obviously makes them less secure, or something. */ Oh crap let me go register milworm.com so I can be a little more secure in the eyes of a battle.net bot developer. lmfao

Re: [Full-disclosure] Beware trojaned exploits!

2005-07-27 Thread Ron
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hmm, I'm noticing a pattern. Warning: don't download exploits from any sites that have an 'o' replaced with a '0'! The 0 obviously makes them less secure, or something. [EMAIL PROTECTED] wrote: > Hackers may be at risk! > > It has come to our att

Re: [Full-disclosure] Beware trojaned exploits!

2005-07-26 Thread Mark Sec
Yep, many exploits/shellcodes are "fake" on the wild , but does anyone have a tools to verify the shellcodes "public or 0days" online or sources codes? something like "reverse shellcode" i belive to see something online where u put the shellcode and them u see the "action" that u shellcode have.

[Full-disclosure] Beware trojaned exploits!

2005-07-26 Thread securitymarket
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hackers may be at risk! It has come to our attention that a large amount of public security exploits/software have been modified and re-posted to legitimate trusted information sites for public downloads. We have recently came across 5 exploits that