Ending a few arguments with one simple attachment.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

There seems to be some confusion about whether or not this bug can be exploited on any other operating systems than OpenBSD.  Here's a second version of our private exploit, apache-massacre.c, called apache-nosejob.c.  Used correctly, it will successfully exploit any vulnerable Free/Net/OpenBSD (x86) machine.

Over the weekend and during next week we'll release a few more pieces of tasty candy, including GeneralCuster.exe, and quite possibly apache-massacre.c.

The mailing lists may now return to their normal level of mediocrity until we're ready to publicize some more warez.

- -GOBBLES Security

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com

wlwEARECABwFAj0UAMIVHGdvYmJsZXNAaHVzaG1haWwuY29tAAoJEBzRp5chmbAPix0A
n3+UQy72ENv6KSwlcDNM12YrLQmdAJ9PTEjb5N4gyGm/hkgdMXjcHTF8pA==
=X2Lc
-----END PGP SIGNATURE-----

Attachment: apache-nosejob.c
Description: Binary data

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com

wj8DBQA9FAC8HNGnlyGZsA8RAiNZAJ90WUHBQjYg9KSyzZKz0WLddgOBggCcDfoh/DXN
oYWxbCu8gl2Cz2SUcrU=
=oZmB
-----END PGP SIGNATURE-----

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux