Full Disclosure mailing list archives

Re: HD Moore


From: "Garrett M. Groff" <groffg () gmgdesign com>
Date: Mon, 5 May 2008 13:40:09 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

These sorts of emails, while perhaps very accurate, only encourage a
barrage of emails concerning our apparent involvement in a large
governmental conspiracy and/or our "script kiddiness." I think ignoring
such emails from netdev are in order, tempting as they are to respond to.


- ----- Original Message ----- 
From: Nate McFeters 
To: Valdis.Kletnieks () vt edu 
Cc: n3td3v ; full-disclosure () lists grok org uk 
Sent: Monday, May 05, 2008 1:24 PM
Subject: Re: [Full-disclosure] HD Moore


More importantly than any of this is how great it is for vulnerability
research.  Makes it much easier to encode shell code, etc.  Plus the
msfpescan features are bad assery.  Of course, n3td3v has no ideas what
these features are for so he thinks it's a script kiddy tool.

Andrew, you're so predictably boring... is there not something you have
expertise on that you can talk about?

Obviously you're not in the right place on this list.

Nate

 
On 5/5/08, Valdis.Kletnieks () vt edu <Valdis.Kletnieks () vt edu> wrote: 
On Sun, 04 May 2008 16:27:49 BST, n3td3v said:
On Fri, May 2, 2008 at 9:32 AM, Nate McFeters <nate.mcfeters () gmail com>
wrote: 
Oh that... Yeah, shame on hd... Maybe he was busy updating metasploit
so that real researchers have a great vulnerability development
framework, or something else that provided some worth to people.

Maybe he was busy updating Metasploit so that script kids have a great
vulnerability development framework.

He should stop providing them with a great vulnerability development
framework.  

There's 2 really great uses for metasploit for white hat security guys:

1) When you're handed a /16 or two during a pen test, and need a quick way
to poke a whole bunch of machines for a vulnerability, it's hard to
roll-your-own
exploit tester as fast as you can chinese-menu one in metasploit.

2) It's a *great* tool for impressing on a PHB just how easy it is to
launch
an exploit for something at one of the unsecured systems he's responsible
for.


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/






- ---------------------------------------------------------------------------
- -----


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.2 (Build 2014) - not licensed for commercial use: www.pgp.com

wj8DBQFIH0YySGIRT5oVahwRAnosAJ4hHPGYV1fW2rVb6BdAv8YTXqfvzgCcCLWE
46UCD/zeo++7hxpDyT2icsM=
=klVh
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: