Re: Exploit for PopPToP PPTP server - Working version

From: blightninjasat_private
Date: Fri Apr 25 2003 - 11:45:08 PDT

  • Next message: JeiAr: "Invision Power Board Plaintext Password Disclosure Vuln"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    Attached is a working copy of the poptop exploit.
    This has been tested, and verified working.
    
    This and other editions available at www.freewebs.com/blightninjas/
    
    - --blightninjas
    -----BEGIN PGP SIGNATURE-----
    Version: Hush 2.2 (Java)
    Note: This signature can be verified at https://www.hushtools.com/verify
    
    wmEEARECACEFAj6pgjYaHGJsaWdodG5pbmphc0BodXNobWFpbC5jb20ACgkQ1lXHmsSz
    kSC7UwCeOn5HVg0Mg1QfTqZG0zjEwCFnOfoAoJZRUjnoJUN3mEpCwnCvgw/5dgMb
    =kkVX
    -----END PGP SIGNATURE-----
    
    
    
    

    Concerned about your privacy? Follow this link to get FREE encrypted email: https://www.hushmail.com/?l=2 Big $$$ to be made with the HushMail Affiliate Program: https://www.hushmail.com/about.php?subloc=affiliate&l=427



    This archive was generated by hypermail 2b30 : Fri Apr 25 2003 - 13:17:52 PDT