Full Disclosure mailing list archives
Re: [Snort-sigs] kadmind exploit rules
From: anakata <anakata () anakata hack se>
Date: Wed, 11 Dec 2002 03:09:40 -0100 (GMT)
and the IRC channels are all trading a file called herakles.c and a binary called kerberous.If these are available, I would love to have a copy to verify the signatures. We do not possess a copy of these at this time.
* herakles - kadmind (atleast kerberos4 <=4-1.2 and heimdal <=0.5) x86 remote exploit * - discovered and coded Oct. 2002 by anakata <anakata () hack se> ***************************************************************************** * THIS IS UNPUBLISHED PROPRIETARY SOURCE CODE OF Anakata Labs. * YOU ARE NOT ALLOWED TO USE OR REDISTRIBUTE THIS MATERIAL, ANY MATERIAL * DERIVED FROM THIS MATERIAL, OR ANY MATERIAL RESULTING FROM THE COMPILATION, * ASSEMBLY, ETC. OF THIS MATERIAL WITHOUT THE PRIOR WRITTEN CONSENT OF THE * AUTHOR(S). * Violation of the above constitutes a violation of Swedish and international * copyright and intellectual property laws. ***************************************************************************** ^^^ Yes, that DOES apply to YOU. --- anakata <anakata () hack se>, Corpus Hypercubus http://www.anakata.hack.se, IRC: {ef,irc,dal,slash}net, regular of #hack.se/efnet Cogito, ergo infestus sum. [I think, therefore I am dangerous.] _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Re: [Snort-sigs] kadmind exploit rules anakata (Dec 10)
- Re: Re: [Snort-sigs] kadmind exploit rules Knud Erik Højgaard (Dec 10)