Full Disclosure mailing list archives
Re: Gary Coleman Works for Globalintersec!
From: Jack Ahz <anoncoder () yahoo com>
Date: Wed, 8 Jan 2003 23:36:31 -0800 (PST)
...if you are going to harass me at least harass me about SNOSOFT...
Thank you kindly, sir. I don't mind if I do! But we'll save that for another post.
http://www.globalintersec.com/staff.html
Let's look at that... If you knew how to read English, you would see that the only explicit profiles exist for the Board of Directors. None of the consultants are listed.
Second in regards to your comments on http://www.globalintersec.com/adv/sudo-2002041701.txt what part of that advisory jives with hudo? http://packetstormsecurity.org/0211-exploits/hudo.c
Uhh.... it's the same prompt expansion bug.
> Even Mr. FC could have crafted up an exploit in less than 8 months IF > THAT WERE THE CASE. If I remember fc did create an exploit... I think I saw a log of it on being exploited eurocompton or something.... maybe I am wrong though. something like fc.angelfire.com I forget maybe it was geocities...
That was my intimation. I know that fc did create an exploit, and it took him a very long time!
What will all stop? You will stop being harassing me if I stop what? I had NOTHING to do with the golobalintersec sudo or ssh advisories...
You now have the option to repent of your sins and be electrocuted on the premises.
Well since I am such a fraud I will contribute yet another fake exploit with fake gdb output and fake results... maybe you guys can go through the code to HPUX ftpd and point out how this is not exploitable...I wouldn't know I have never seen it. This could have something to do with http://files.ruca.ua.ac.be/pub/depot/sw11/PHNE_20714.text But then again... I could be a fraud. -KF
Yeah, all I needed to see was the reference to ioctl() in that piece of code to know that you aren't capable of writing it! Yours truly, Jack __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Exploit for auth2-pam for vuln linux opensshd Jack Ahz (Jan 08)
- Re: Exploit for auth2-pam for vuln linux opensshd (KF's fake HPUX exploit with fake gdb output included free!) KF (Jan 08)
- Re: Exploit for auth2-pam for vuln linux opensshd (KF's fake HPUX exploit with fake gdb output included free!) KF (Jan 08)
- Re: Gary Coleman Works for Globalintersec! Jack Ahz (Jan 08)
- Re: Re: Gary Coleman Works for Globalintersec! KF (Jan 09)
- Re: Exploit for auth2-pam for vuln linux opensshd ATD (Jan 09)
- Re: Exploit for auth2-pam for vuln linux opensshd (KF's fake HPUX exploit with fake gdb output included free!) KF (Jan 08)