Full Disclosure mailing list archives
Re: Beware trojaned exploits!
From: Ron <iago () valhallalegends com>
Date: Wed, 27 Jul 2005 08:37:07 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hmm, I'm noticing a pattern. Warning: don't download exploits from any sites that have an 'o' replaced with a '0'! The 0 obviously makes them less secure, or something. securitymarket () hush ai wrote:
Hackers may be at risk! It has come to our attention that a large amount of public security exploits/software have been modified and re-posted to legitimate trusted information sites for public downloads. We have recently came across 5 exploits that have had a shellcode modification after legit verification of trusted download sites. The following information security sites have listed a number of modified exploits: unl0ck security research g0tfault security m00 security
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.9.15 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFC544DfqSf2EkP4p4RAq1iAJwLcdKzebJtb8nsJ9vbMr1cAXLDYwCffAwX ncwv02cySQDLh/tYaEuMmzI= =eUHO -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Beware trojaned exploits! securitymarket (Jul 26)
- Re: Beware trojaned exploits! Mark Sec (Jul 26)
- Re: Beware trojaned exploits! Ron (Jul 27)
- <Possible follow-ups>
- Re: Beware trojaned exploits! str0ke (Jul 27)
- Re: Beware trojaned exploits! ad () class101 org (Jul 27)
- Re: Beware trojaned exploits! str0ke (Jul 27)