Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Sergio 'shadown' Alvarez
Dear Nicholas Lemonias, I don't use to get in these scrapy discussions, but yeah you are in a completetly different level if you compare yourself with Mario. You are definitely a Web app/metasploit-user guy and pick up a discussion with a binary and memory corruption ninja exploit writter like

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Sergio 'shadown' Alvarez
, Nicholas Lemonias. lem.niko...@googlemail.com wrote: Go to sleep. -- Forwarded message -- From: Nicholas Lemonias. lem.niko...@googlemail.com Date: Fri, Mar 14, 2014 at 2:16 PM Subject: Re: [Full-disclosure] Google vulnerabilities with PoC To: Sergio 'shadown' Alvarez shad...@gmail.com Go

Re: [Full-disclosure] Video tutorial: Stack-Based Buffer Overflow

2012-05-16 Thread Sergio 'shadown' Alvarez
are you serious?, if so...this is how that technique will work in the real world: http://surfwithberserk.com/img/funny/epic_fails/24.jpg On May 16, 2012, at 5:48 AM, Juan Sacco wrote: I've made a video tutorial about buffer overflows take a look and share it if you like it! Video

Re: [Full-disclosure] [New Security Tool] INSECT Pro 2.6.1 release

2011-06-23 Thread Sergio 'shadown' Alvarez
Juan, I've seen you are using Michal Zalewski's skipfish as engine, isn't it a license violation? Cheers, Sergio On Jun 23, 2011, at 3:16 AM, Juan Sacco wrote: Test your network security and audit your website using the same tools as hackers. INSECT Pro 2.6.1 is available for purchase

Re: [Full-disclosure] iAWACS 2010 : Rules of the PWN2KILL contest

2010-01-11 Thread Sergio 'shadown' Alvarez
Hi, I see a lot of 'what the participants have to do' and 'what the participants have to give away', but I don't see anywhere what the winner/s of the contest would win in all this. Where can I find that information? in order to decide if it is worth participating or not. Thanks in

Re: [Full-disclosure] [Advisories] CORE-2009-0114 - HTTP Response Splitting vulnerability in Sun Delegated Administrator

2009-04-23 Thread Sergio 'shadown' Alvarez
On Apr 23, 2009, at 12:56 AM, Core Security Technologies advisories wrote: Sergio 'shadown' Alvarez wrote: Hi, In the last CORE's advisories I've seen the following credits: 7. *Credits* This vulnerability was discovered by the SCS team [3] from Core Security Technologies. Does

Re: [Full-disclosure] CORE-2009-0114 - HTTP Response Splitting vulnerability in Sun Delegated Administrator

2009-04-22 Thread Sergio 'shadown' Alvarez
Hi, In the last CORE's advisories I've seen the following credits: 7. *Credits* This vulnerability was discovered by the SCS team [3] from Core Security Technologies. Does this SCS team's guy have a name ? Even in a football match 'the team' wins the match, but the GOALS are made by

[Full-disclosure] Some hashes for the record

2008-01-22 Thread Sergio 'shadown' Alvarez
b1ca4f27ed99944422c784e06379ba1d 32f1dcdda06b6fea3f4198b14d9e89563f6eccf6 4a959d1db292b3c5f85ed83263dd80b3 a60a7fbd6201ed7b7b49170e8c17ae8098f2e743 Cheers, ~ Sergio - -- Sergio 'shadown' Alvarez Security Researcher === email: [EMAIL PROTECTED] gpg : F140 A2E4 1675 BDB6 9FE4