[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Beware trojaned exploits!
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: Re: [Full-disclosure] Beware trojaned exploits!
- From: Ron <iago@xxxxxxxxxxxxxxxxxxx>
- Date: Wed, 27 Jul 2005 08:37:07 -0500
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hmm, I'm noticing a pattern.
Warning: don't download exploits from any sites that have an 'o'
replaced with a '0'! The 0 obviously makes them less secure, or
something.
securitymarket@xxxxxxx wrote:
> Hackers may be at risk!
>
> It has come to our attention that a large amount of public
> security exploits/software have been modified and re-posted
> to legitimate trusted information sites for public downloads.
>
> We have recently came across 5 exploits that have had a shellcode
> modification
> after legit verification of trusted download sites.
>
> The following information security sites have listed a number of
> modified exploits:
>
> unl0ck security research
> g0tfault security
> m00 security
>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.9.15 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFC544DfqSf2EkP4p4RAq1iAJwLcdKzebJtb8nsJ9vbMr1cAXLDYwCffAwX
ncwv02cySQDLh/tYaEuMmzI=
=eUHO
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/