Full Disclosure mailing list archives

Re: XerXes DoS tool Leak. not so 0day now!


From: Sanguinarious Rose <SanguineRose () OccultusTerra com>
Date: Fri, 8 Jul 2011 19:55:35 +0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hello,
I hate to break it to you but that isn't the tool used by jester. I
wrote it during research on possibilities on how his tool functioned.
There is allot of bugs since it was more of a hack together of code
rather then being 100% viable. I designed it to run using torsocks
wrapper (http://code.google.com/p/torsocks/) with a 2nd copy running
to cycle the tor nodes due to me being lazy at wanting to code SOCKS5
in C. If you do some beta runs per above how to use it you find it
doesn't switch tor exit nodes either. I also found out latter the null
byte, "\0", was not required for it to have the same effects.

- - William Welna
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iF4EAREIAAYFAk4XYW0ACgkQdBwqj+jihCWGtwD+N6hUtr+aXj8xJVZjKvdX1wes
Uxr4DOyWuXVQmhkjXv8A/20bdh5tMA2wVqrSPdtJCvZzuU1Tgii/+Isopskxp1Qv
=qWIU
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: