Vulnerability Development mailing list archives
Re: Malicious use of grc.com
From: netscience () hushmail com
Date: Mon, 26 Nov 2001 17:42:14 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Greetings: ShieldsUp(tm) is an application developed by Steve Gibson of Gibson Research Corporation that allows a web user to request a remote port scan of their local system via the GRC.Com web site (https://grc.com/x/ne.dll?bh0bkyd2).
Instead, we can easily bypass the need to crack the hash by simply using the "IP Agent" supplied by Gibson.
Sure thing... http://grc.com/x/ne.dll?rh1bi2l2=4yy1fs5u=4vh1fs5u=4vy2fs5u=4ay1fs5u Will produce 4 sets of ip addresses. Diddle The Digits™ and you will produce 4 different sets each time...eventually you can figure out the code. -----BEGIN PGP SIGNATURE----- Version: Hush 2.1 Note: This signature can be verified at https://www.hushtools.com wl8EARECAB8FAjwC764YHG5ldHNjaWVuY2VAaHVzaG1haWwuY29tAAoJECFLG0i2k7ir IegAnjQRPYNO7TVVkRw0L6Al6CVFxcufAJ0eLsP/WRV6caUG4zMcQQZ0wX8+/g== =F+XA -----END PGP SIGNATURE-----
Current thread:
- Re: Malicious use of grc.com netscience (Nov 26)
- <Possible follow-ups>
- Malicious use of grc.com Magni (Nov 26)
- Re: Malicious use of grc.com Brad (Nov 26)
- Re: Malicious use of grc.com Thorsten Droigk (Nov 26)
- Re: Malicious use of grc.com Blue Boar (Nov 26)
- Re: Malicious use of grc.com Festive (Nov 27)
- Re: Malicious use of grc.com Nicolas Gregoire (Nov 27)
- RE: Malicious use of grc.com Everhart, Glenn (FUSA) (Nov 28)
- RE: Malicious use of grc.com Nicko Demeter (Nov 28)
- RE: Malicious use of grc.com H C (Nov 28)