Full Disclosure mailing list archives

remote kernel exploits?


From: isergevsky () hushmail com (isergevsky () hushmail com)
Date: Sun, 8 Sep 2002 06:11:18 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello dear community fellows,

There have been many rumours regarding tcp/ip implementation vulnerabilities in both Linux and BSD (Free and Open) 
operating systems.
One of these days, while updating my underground news by social engineering a script kid, i was able to learn that the 
underground is in posession of a couple of headers, claimly being part of two exploits for the vulnerabilities above. 
From those headers and discussions with the kid i learnt the following:

- - the persons that found/coded these go by the name 'Ac1dB1tch3z'
- - are blackhat hackers
- - they hate security groups like ADM/TESO
- - they are formed by at least 3 members: t3kn10n, t3kn0h0e and n0n3

Kids from the hacking/warrez scene are very scared by these guys as some already managed to get their boxes deleted 
with no further notice. It seems that 'Ac1dB1tch3z' are the 'Delta Force' of the (in)famous PROJECT MAYHEM (as one guy 
in #phrack@efnet stated). I will attach to my e-mail the headers i managed to get.

Sincerely Yours,
Ivan

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com

wl8EARECAB8FAj175wIYHGlzZXJnZXZza3lAaHVzaG1haWwuY29tAAoJEMfRnqqodk8T
y7IAn2zTTbzjhAJyMPB7n1fUIVf6XKWwAJ9nDGQD/zin++dEYnd/S7quUz976Q==
=PTDZ
-----END PGP SIGNATURE-----




Get your free encrypted email at https://www.hushmail.com


Current thread: