well, all that really depends on the theory that the OP actually read it prior to executing it.
2009/11/26 Andrew Farmer <[email protected]> > On 24 Nov 2009, at 13:41, Tyler Durten wrote: > > And this is what I'm talking about: > > http://seclists.org/fulldisclosure/2005/Apr/412 > > > ... which reads, in part: > > main() > > { > > > > //Section Initialises designs implemented by mexicans > > //Imigrate > > system(launcher); > > system(netcat_shell); > > system(shellcode); > > I can understand possibly overlooking something clever (like a fake exploit > that buffer-overflows itself), but this isn't even marginally subtle. > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ >
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
