[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Exhibition: Interim Summary





Eli Marmor wrote:

> OK, I have over 100 messages to read, so maybe what I write here
> is already written on one of these messages, so I apologize in
> advance:
>
> 1. I didn't write that Ehood Tenenbaum didn't know what was buffer
>    overflow; I wrote that "he *claimed* that he didn't know" (the
>    "*" were in my original message). Of course he knows, at least
>    according to a private "research" I did yesterday.
>

i do not believe you eli, a serious man like yourself is even taking time to
reserch on that petty hacker, lemme tell you something from my hacking
expirence, it does not aquires to be smart, besides as far as i know he used
typical methods, the only reason he could hack the computers were the poor
protection that was on them, i persoanlly saw an hacker friend of mine hack to
the pentagon 2 days later (after tetanbuam hacked in) and the machine was preety
tight but still he used an old buffer overflow exploit, after we been looking
the system for two mins we been kicked out of it and the telnet port been
closed...

i know he used nmap and i do not have any respect for anyone who use a port
scanner to hack or to do whatever...


> 2. My resource (let's not mention his name) claimed that they had
>    another name for this kind of holes (not "buffer overrun", but
>    totally different).
>

names ?if he's so smart he need to know only by talking on the subject what he's
talking about, besides i hang in irc and other hackers circles, the word that we
use is buffer overflow, maybe it just those worldwide hackers...



> 3. I believe that Tenenbaum even knows the words "buffer overflow"
>    and only prefers not to refer to it and to deny knowing it. It
>    is a correct way to behave, surely in relative to face-to-face
>    interviews for "Walla Today" (before he was caught).
>

deny ?buffer overflow is no secret, its one of the basics....
if you want modern hacking tech's go to read modern hacking by rhino 9



> 4. Regarding to the tools he used: My resource (sorry again, cannot
>    specify names) admitted that most of the tools were taken from
>    the Net, but some WERE DEVELOPED BY TENENBAUM. My *personal*
>    impression (from my talk with him) was that he knows UNIX and
>

developed ?this guy got no knowledge in anything regarding nothing but hacking,
i know alot of hackers who has no brain and use packaged stuff to hack, thats
lame for my opiniun...
besides hackers who has been discovered can make more money by sharing the
information then not sharing,

>    TCP/IP, "even" more than many of us.
>

maybe more then me, but thats not so hard ;)

> 5. I know that this story is so exciting etc., etc., but I brought
>    it only as a "BTW" story; Please cancel this thread.
>

the story make my blood hot, because tetanbaum is nothing more then a lifeless
bum, i do not believe he should get any credit for something alot of good
hackers did before himgood hackers never show-off, when a good hacker as been in
a system the admin wont even know it...
people who have desire to show-off are people who have limited abilitis...


>
>
> I asked him this question, and got a convincing answer, but after
> these 3 days, so many talks with so many people, I really cannot
> remember this answer, only that he knew about us, knew some of us,
> and even tracked the list or its archive. Sorry for my F memory!
>

jizz, everyone knows volatile (me) in the local modem scene, i never saw the
analyzer anywhere in the local scene, as far as i know he's just another
wennebie hacker who got discovered, because he wanted publishity (one more
reason why he's a wennbie).

Peleg Samson A.K.A Volatile
UniqTech.
.