Vulnerability Development mailing list archives
Re: RES: Maximum Linux Security (d/l)
From: kb8rln () PENGUINMASTER COM (Richard Rager)
Date: Tue, 4 Jul 2000 20:24:45 -0600
On Tue, 4 Jul 2000, Guilherme Mesquita wrote:
Ok I confess, that old site quote bugs, and some old exploits contained in those old books *still work in VERY VERY rare cases* so if a hacker which read a book like that has an objective, probably he wouldnt read those books to findout how to hack the box with is in his way.
Please remember programmer sometimes make the same mistakes. * No buffer overflow checking * sanity checking the user input. If you write a stander protocol interface your should try all old exploit known. Enjoy, Richard
Current thread:
- Re: Default passwords, (continued)
- Re: Default passwords Ex Machina (Jul 03)
- Re: Default passwords Juan M. Courcoul (Jul 03)
- Page Joe Jenkins (Jul 03)
- Re: Default passwords Russ Katz (Jul 03)
- Re: Default passwords Cold Fire (Jul 03)
- default password list - round 1. Roelof Temmingh (Jul 04)
- Re: default password list - round 1. Jonathan Leto (Jul 04)
- Maximum Linux Security (d/l) Arturo Busleiman (Jul 04)
- Re: Maximum Linux Security (d/l) Korhan Gurler (Jul 04)
- RES: Maximum Linux Security (d/l) Guilherme Mesquita (Jul 04)
- Re: RES: Maximum Linux Security (d/l) Richard Rager (Jul 04)
- Any Critical Path N-Plex vulnerabilities ? Juan M. Courcoul (Jul 05)
- default passwords...partII Roelof Temmingh (Jul 04)
- Re: default passwords...partII Daniel SALAGEAN (Jul 04)
- Re: default passwords...partII Joe Jenkins (Jul 05)
- Re: default passwords...partII Daniel SALAGEAN (Jul 05)
- Re: default passwords...partII CouNT (Jul 06)
- Re: default passwords...partII Max Vision (Jul 04)
- Formatting bugs (was BitchX /ignore bug) Kotz (Jul 04)
- Re: Maximum Linux Security (d/l) Renato Murilo Langona (Jul 04)
- BitchX /ignore bug Rick Jansen (Jul 04)