Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: Multiple 0-days in Dark Comet RAT
From: Gage Bystrom <themadichib0d () gmail com>
Date: Thu, 11 Oct 2012 09:26:20 -0700

That's because no one particularly cares that it is malware. Botnets,
rootkits, rats, ect are all just as potentially vulnerable as any other
software, except the impact is pretty low. Let's say someone was exploiting
this in the wild. Realistically what are they accomplishing? Most of the
time they'd just be jacking boxes from other people that already got in.
Hardly a feat when chances are you could get in through the same methods
the original guy did.
On Oct 11, 2012 7:08 AM, <Valdis.Kletnieks () vt edu> wrote:

On Wed, 10 Oct 2012 23:25:50 +0200, Pascal Ernster said:

I suppose it turns into a 0 day when you post it on this mailing list
and happen to be in the mood to put the vendor's marketing division on
BCC.

-1 day could be when you ask a friend to check your mail to this ML for
major grammar errors before you post it.

All this ranting about the meaning of a 0-day - and not one person has
mentioned the fact that the vulnerability is in *malware*??!?

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]