Re: [Full-Disclosure] no more public exploits

From: Dave Aitel (dave_at_immunitysec.com)
Date: 04/27/04

  • Next message: Patrick Olsen: "[Full-Disclosure] programming"
    To: "Ng, Kenneth (US)" <kenng@kpmg.com>
    Date: Tue, 27 Apr 2004 16:45:06 -0400
    
    

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    Well, if it's that much of an issue, you can always buy your exploits
    from a commercial source, such as Immunity
    (http://www.immunitysec.com/CANVAS/ . We have an LSASS (one exploit
    fits all) and a PCT exploit (ported from SP0-4), so you can show all
    your management exactly why they should patch. And you can also feel
    secure that the exploits you download aren't trojaned when you're
    using something with commercial support. At $995 for a full site
    license, including source, CANVAS is cheaper than the alternative...

    Dave Aitel
    Immunity, Inc.

    Ng, Kenneth (US) wrote:

    | I agree, tis a shame. So many places I know that refuse to patch
    | until someone can show them an actual exploit that goes crashing
    | through their defenses. After all, "we have a firewall in place".
    | After all, "...Microsoft (or insert almost any other vendor) says
    | they are secure". After all, "why would someone hack us?".
    | Unfortunately they don't realize that just because I don't have a
    | tool that will do this doesn't mean that someone out on the net
    | doesn't.
    |
    | -----Original Message----- From:
    | full-disclosure-admin@lists.netsys.com
    | [mailto:full-disclosure-admin@lists.netsys.com]On Behalf Of Yabby
    | Sent: Tuesday, April 27, 2004 1:06 PM To: johnny cyberpunk;
    | full-disclosure@lists.netsys.com Subject: Re: [Full-Disclosure] no
    | more public exploits
    |
    |
    | Even though I think that the publication of your code might have
    | been a couple of weeks too soon: too bad you chose to abandon full
    | disclosure. A lot of people do not have the skills to transform
    | theoretical vulnerabilities into practical exploits. With the lack
    | of proof that the vulnerability can really be exploited, a lot of
    | sysadmins will decide not to patch, leaving the holes in tact for
    | the real blackhats, that have possession of the malicious code
    | anyway....
    |
    | maarten
    |
    |> this is an anouncement that i personally have no more intention
    |> to publish any
    |
    |
    | _______________________________________________ Full-Disclosure -
    | We believe in it. Charter:
    | http://lists.netsys.com/full-disclosure-charter.html
    |
    |
    |
    *****************************************************************************
    | The information in this email is confidential and may be legally
    | privileged. It is intended solely for the addressee. Access to this
    | email by anyone else is unauthorized.
    |
    | If you are not the intended recipient, any disclosure, copying,
    | distribution or any action taken or omitted to be taken in reliance
    | on it, is prohibited and may be unlawful. When addressed to our
    | clients any opinions or advice contained in this email are subject
    | to the terms and conditions expressed in the governing KPMG client
    | engagement letter.
    |
    *****************************************************************************
    |
    |
    | _______________________________________________ Full-Disclosure -
    | We believe in it. Charter:
    | http://lists.netsys.com/full-disclosure-charter.html

    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.1 (GNU/Linux)
    Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

    iD8DBQFAjsZSzOrqAtg8JS8RAiPnAKCDo9DtSSFwAmAYK2t59qZXOULTlQCg2aba
    SwUDLWjudVVbie0Fqcs8PMo=
    =/tz5
    -----END PGP SIGNATURE-----

    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html


  • Next message: Patrick Olsen: "[Full-Disclosure] programming"

    Relevant Pages