[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: [Full-disclosure] Fwd: beyond security sucks at coding
From: reepex <reepex () gmail ! com>
Date: 2007-12-29 7:08:07
Message-ID: e9d9d4020712282308o44865fc0sc2c97da9bbcb0560 () mail ! gmail ! com
[Download RAW message or body]
[Attachment #2 (multipart/alternative)]
In case you missed it before
---------- Forwarded message ----------
From: reepex <reepex@gmail.com>
Date: Dec 23, 2007 8:22 PM
Subject: beyond security sucks at coding
To: full-disclosure@lists.grok.org.uk, Gadi Evron <ge@linuxbox.org>
http://www.milw0rm.com/exploits/4773
Gadi and Noam Rathaus and the crew suck at coding once again.
>From the "exploit":
my $ciphers = "";
my $ciphers_length = pack('n', length($ciphers));
my $certificate = "";
my $certificate_length = pack('n', length($certificate));
I think the italian Phd students can write better perl than this.
You have to give it to Gadi and friends though spending the last year (
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-4343 Original release
date:9/28/2006 ) writing this complex exploit and testing it to work
on all
platforms ever created.
Noam's inability to code now shows me why all his books (
http://www.amazon.com/s?ie=UTF8&search-type=ss&index=books&field-author=Noam%20Rathaus&page=1)
are basic extensions and ripoffs of other peoples' code and why he
contributes nothing original or useful.
I guess to work at beyond security you must be a master in the art of
copy/paste, stealing code, and bullshitting technical "knowledge"
[Attachment #5 (text/html)]
In case you missed it before<br><br><div class="gmail_quote">---------- Forwarded message \
----------<br>From: <b class="gmail_sendername">reepex</b> <<a \
href="mailto:reepex@gmail.com">reepex@gmail.com</a>><br>Date: Dec 23, 2007 8:22 PM \
<br>Subject: beyond security sucks at coding<br>To: <a \
href="mailto:full-disclosure@lists.grok.org.uk">full-disclosure@lists.grok.org.uk</a>, Gadi \
Evron <<a href="mailto:ge@linuxbox.org">ge@linuxbox.org</a>><br><br> <br><a \
href="http://www.milw0rm.com/exploits/4773" \
target="_blank">http://www.milw0rm.com/exploits/4773</a><br><br>Gadi and Noam Rathaus and the \
crew suck at coding once again.<br><br>From the "exploit":<br><br> <pre> my $ciphers \
= ""; <br> my $ciphers_length = pack('n', length($ciphers));<br><br> my \
$certificate = "";<br> my $certificate_length = pack('n', \
length($certificate));</pre>I think the italian Phd students can write better perl than this. \
<br><br>You have to give it to Gadi and friends though spending the last year ( <a \
href="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-4343" \
target="_blank">http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-4343</a>
<span>Original release date:</span>
9/28/2006 ) writing this complex exploit and testing it to work on all platforms ever \
created. <br>Noam's inability to code now shows me why all his books ( <a \
href="http://www.amazon.com/s?ie=UTF8&search-type=ss&index=books&field-author=Noam%20Rathaus&page=1" \
target="_blank">
http://www.amazon.com/s?ie=UTF8&search-type=ss&index=books&field-author=Noam%20Rathaus&page=1</a> \
) are basic extensions and ripoffs of other peoples' code and why he contributes nothing \
original or useful. <br><br>I guess to work at beyond security you must be a master in the art \
of copy/paste, stealing code, and bullshitting technical "knowledge"<br> </div><br>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic