Full Disclosure mailing list archives
Re: XSS and SQL injection via SIP (part 2) and toll fraud bonus
From: phioust <phioust () gmail com>
Date: Sat, 20 Oct 2007 00:50:00 -0500
On 10/20/07, lulzlulzluzluz <hardened.php () gmail com> wrote:
security is serious business. plz do not joke like that phioust: xss0day -> x-ssh0day, see serious.
Only drraid has ssh 0day On 10/19/07, Radu State < State () loria fr> wrote:
my $hex = '';for (my $i = 0; $i < length($_[0]); $i++) {LOL 3 phds and not one knows the range operator?
for(0..length($_[0]))
$attackerUser = $ARGV[3];$callUser = $ARGV[0]; $targetIP = $ARGV[1]; $targetPort = $ARGV[2]; $attackerIP= $ARGV[4]; $attackerPort= $ARGV[5];have you never heard of shift? or what about split @ARGV based on
spaces ... l0l perl retards Did you only write this in perl because C is too complicated for you? you better hope perl underground does see this bullshit perl!!!
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- XSS and SQL injection via SIP (part 2) and toll fraud bonus Radu State (Oct 19)
- Re: XSS and SQL injection via SIP (part 2) and toll fraud bonus phioust (Oct 19)
- Message not available
- Re: XSS and SQL injection via SIP (part 2) and toll fraud bonus phioust (Oct 19)
- Re: XSS and SQL injection via SIP (part 2) and toll fraud bonus state (Oct 19)
- Re: XSS and SQL injection via SIP (part 2) and toll fraud bonus phioust (Oct 20)
- Re: XSS and SQL injection via SIP (part 2) and toll fraud bonus Valdis . Kletnieks (Oct 20)
- Message not available
- Re: XSS and SQL injection via SIP (part 2) and toll fraud bonus phioust (Oct 19)