
Full Disclosure mailing list archives
openssl exploit code (e-secure-it owned)
From: nexus () patrol i-way co uk (Nexus)
Date: Thu, 19 Sep 2002 17:10:43 +0100
However, you could acknowledge that we were not the only one at the same time. Untold security companies and sites were defaced by PoizonB0x and others in that very same period. Including: SecurityNewsportal, CNet, Attrition, Lucent. Microsoft (18 times in total?), SANS, CERT, SecurityFocus and many others.Was SecurityFocus actually defaced? I thought they wacked an add server that then placed a hacked banner on the SF site. I could be wrong though.
Defaced, yes. Compromised, no. http://www.attrition.org/security/commentary/secfocus.html See http://www.attrition.org/errata/irony.html for similar amusement ;-) Also see the ton of RFC1918 addresses and MTA banners littering the SMTP headers of "security" firms on this list... Cheers.
Current thread:
- openssl exploit code (e-secure-it owned) Andrew Thomas (Sep 18)
- openssl exploit code (e-secure-it owned) hellNbak (Sep 18)
- openssl exploit code (e-secure-it owned) Charles Stevenson (Sep 18)
- openssl exploit code (e-secure-it owned) Andrew Thomas (Sep 18)
- <Possible follow-ups>
- openssl exploit code (e-secure-it owned) Arjen De Landgraaf (Sep 19)
- openssl exploit code (e-secure-it owned) hellNbak (Sep 19)
- openssl exploit code (e-secure-it owned) Nexus (Sep 19)
- openssl exploit code (e-secure-it owned) Isaak Bloodlore (Sep 19)
- openssl exploit code (e-secure-it owned) hellNbak (Sep 19)
- openssl exploit code (e-secure-it owned) hellNbak (Sep 18)