Vulnerability Development mailing list archives

Re: Telnetd exploit for solaris


From: Cory McIntire <cory () loadedpenguin com>
Date: Fri, 7 Sep 2001 08:27:45 -0500

hrm, 
Its topics like these that bring out the best in the *development* field. 
Stanley, while I'm sure your hate for skriptkids is no less than any of the 
rest of us, surely it hasn't blinded you to sarcasm, which _hopefully_ is 
what sween was using. If not sarcasm then possibly just a good old fashion 
"sick of the world/industry/life" rant. Whatever it may be, I do believe that 
just possibly this thread has gotten out of hand and would harm no one by 
killing it. 


On Thursday 06 September 2001 08:35 pm, Stanley G. Bubrouski combined enough 
1's and 0's to make the following:
On Wed, 5 Sep 2001, fintler wrote:
Now why would you possible want something like that...if you were an

sooooo you can drive an industry and root somebody's solaris machine and
prove to SOMEONE's company that this computer security bullshit isn't
just a fad and that are not wasting 60K a year for a "security" expert to
hover over security focus mailing lists and apply patches to expensive
operating systems that were shipped broken in the first place.

this industry needs an old fashioned ass whoopin.

You owe script kiddies... BIG TIME.

The computer and software industries owe script kiddies NOTHING.  Script
kiddies bring down sites, wreak havoc on networks, use compromised as
platforms for attack and all without knowing how what they are using works
or what harm they are doing.

The people owed thanks are the people who find and report vulnerabilites,
who attempt to offer fixes and workarounds, and yes people who write and
publish proof of concept code and tools.

But there is a huge difference between supplying a proof of concept and
using one to gain unauthorized access to companies system.

GET OFF MY LIST.

This is list is to discuss vulnerabilities, not promote script kiddies as
the great fucking guardian angels of corporate America.  Get real.



Current thread: