Full Disclosure mailing list archives
RE: no more public exploits
From: "Ng, Kenneth (US)" <kenng () kpmg com>
Date: Tue, 27 Apr 2004 14:22:55 -0500
I agree, tis a shame. So many places I know that refuse to patch until someone can show them an actual exploit that goes crashing through their defenses. After all, "we have a firewall in place". After all, "...Microsoft (or insert almost any other vendor) says they are secure". After all, "why would someone hack us?". Unfortunately they don't realize that just because I don't have a tool that will do this doesn't mean that someone out on the net doesn't. -----Original Message----- From: full-disclosure-admin () lists netsys com [mailto:full-disclosure-admin () lists netsys com]On Behalf Of Yabby Sent: Tuesday, April 27, 2004 1:06 PM To: johnny cyberpunk; full-disclosure () lists netsys com Subject: Re: [Full-disclosure] no more public exploits Even though I think that the publication of your code might have been a couple of weeks too soon: too bad you chose to abandon full disclosure. A lot of people do not have the skills to transform theoretical vulnerabilities into practical exploits. With the lack of proof that the vulnerability can really be exploited, a lot of sysadmins will decide not to patch, leaving the holes in tact for the real blackhats, that have possession of the malicious code anyway.... maarten
this is an anouncement that i personally have no more intention to publish any
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html ***************************************************************************** The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized. If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance on it, is prohibited and may be unlawful. When addressed to our clients any opinions or advice contained in this email are subject to the terms and conditions expressed in the governing KPMG client engagement letter. ***************************************************************************** _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- no more public exploits johnny cyberpunk (Apr 27)
- Re: no more public exploits Yabby (Apr 27)
- RE: no more public exploits Curt Purdy (Apr 27)
- Re: no more public exploits list (Apr 28)
- Re: no more public exploits rd (Apr 28)
- <Possible follow-ups>
- RE: no more public exploits Duquette, John (Apr 27)
- Re: no more public exploits Dave Sherohman (Apr 27)
- Re: no more public exploits Yabby (Apr 27)
- Detecting newly added Windows Services (was: no more public exploits) Marcel Krause (Apr 28)
- RE: no more public exploits Douglas Carvalho (Apr 27)
- RE: no more public exploits Ng, Kenneth (US) (Apr 27)
- Re: no more public exploits Dave Aitel (Apr 27)
- Re: no more public exploits nicolas vigier (Apr 27)
- Re: no more public exploits Dave Aitel (Apr 27)
- Re: no more public exploits Dave Aitel (Apr 27)
- RE: no more public exploits Ng, Kenneth (US) (Apr 27)
- Re: no more public exploits chris (Apr 27)
- Re: no more public exploits james (Apr 27)
- Re: no more public exploits Felipe Cerqueira - skylazart (Apr 28)
- Re: no more public exploits gcb33 (Apr 28)
- Re: no more public exploits Evgeny Demidov (Apr 28)
- RE: no more public exploits xavier.poli (Apr 28)