hey, how overhyped is the shit now that its in the while and proving ur ass wrong bitch?
On Wed, Jul 23, 2008 at 5:00 AM, n3td3v <[EMAIL PROTECTED]> wrote: > On Fri, Jul 11, 2008 at 9:22 PM, Sandy Vagina <[EMAIL PROTECTED]> wrote: >> >> n3td3v wrote: >> > Please nominate Mr.DNS aka Dan Kaminsky for Most Overhyped Bug on the >> > Pwnie Awards 2008. >> >> Perhaps if you bothered to read anywhere close to as much as you >> write, you would have seen that Dino, one of the judges, specifically >> disqualified this bug from the Pwnies for being too awesome: >> >> http://blog.trailofbits.com/2008/07/09/dan-kaminsky-disqualified-from-most-overhyped-bug-pwnie/ >> > > Hi Sandy Vagina, > > Looks like they did a U-turn after realising how over hyped the bug actually > is. > > Nominees > > " > Unspecified DNS cache poisoning vulnerability (CVE-2008-1447) > > Dan Kaminsky > > Dan Kaminsky is credited with discovering some unspecified > vulnerabilities in DNS that allow for cache poisoning on a massive > the-intarweb-tubes-will-burst-and-flood-your-basement scale. There has > been massive media attention over this vulnerability and a large > amount of backlash in the security community over the lack of details. > When the full details of the vulnerability are revealed at BlackHat, > the masses will decide whether the hype and secrecy were worth it. > And, more importantly, the Pwnie Judges will vote on whether Dan gets > the Pwnie for Most Overhyped Bug. > > " > > http://pwnie-awards.org/2008/awards.html#overhypedbug > > All the best, > > n3td3v > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
