Full Disclosure mailing list archives

Re: Beware trojaned exploits!


From: Ron <iago () valhallalegends com>
Date: Wed, 27 Jul 2005 08:37:07 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hmm, I'm noticing a pattern.

Warning: don't download exploits from any sites that have an 'o'
replaced with a '0'!  The 0 obviously makes them less secure, or
something.



securitymarket () hush ai wrote:
Hackers may be at risk!

It has come to our attention that a large amount of public
security exploits/software have been modified and re-posted
to legitimate trusted information sites for public downloads.

We have recently came across 5 exploits that have had a shellcode
modification
after legit verification of trusted download sites.

The following information security sites have listed a number of
modified exploits:

unl0ck security research
g0tfault security
m00 security

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.9.15 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFC544DfqSf2EkP4p4RAq1iAJwLcdKzebJtb8nsJ9vbMr1cAXLDYwCffAwX
ncwv02cySQDLh/tYaEuMmzI=
=eUHO
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: