Full Disclosure mailing list archives
Re: Win-Trap captured DCOM-RPC exploit code, on the spot!
From: Anne Carasik <gator () mail cacr caltech edu>
Date: Mon, 28 Jul 2003 09:56:32 -0700
I don't think you have too much to worry about anymore. From http://www.phsecurity.com, their account appears to be suspended. -Anne Knud Erik H?jgaard grabbed a keyboard and typed...
Executable Security wrote: [snip disgusting commercial] Why dont you people fuck off and die die die? Spamming the list is one thing, which should be punished, but spamming my private inbox is worse. It seems www.phsecurity.com runs some old version of openssl, any takers? info () phsecurity com spam spam info () phsecurity com spam spam, off to usenet we go. -- kokanin, sick of spamming assholes. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
-- .-"".__."``". Anne Carasik, System Administrator .-.--. _...' (/) (/) ``' gator at cacr dot caltech dot edu (O/ O) \-' ` -="""=. ', Center for Advanced Computing Research ~`~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Attachment:
_bin
Description:
Current thread:
- Win-Trap captured DCOM-RPC exploit code, on the spot! Executable Security (Jul 27)
- Re: Win-Trap captured DCOM-RPC exploit code, on the spot! Joel R. Helgeson (Jul 27)
- Re: Win-Trap captured DCOM-RPC exploit code, on the spot! Knud Erik Højgaard (Jul 28)
- Re: Win-Trap captured DCOM-RPC exploit code, on the spot! Anne Carasik (Jul 28)