[Plug-security] Exploitable Virtual Target Builders Wanted

Mark Phillips mark at phillipsmarketing.biz
Sat Aug 17 21:02:14 MST 2013


Lisa,

I have an older Debian production server on Linode. Would you be breaking
it? I will be back in town on Monday. Can we talk then?

Mark
On Aug 17, 2013 3:11 PM, "Lisa Kachold" <lisakachold at obnosis.com> wrote:

> We have a great ESXi server running in the DeVry Rack if you have a
> virtual host to present to the community for public exploit?
>
> This is especially great because you don't have to stand up and talk if
> you don't want to.  We will assign it an IP and let them at it.
>
> It IS especially nice when we expose why the system was exploitable after
> and what small systems changes would have made it rock solid secure, but
> you don't have to do that if you don't want to; we have a whole community
> of security professionals willing to talk on those subjects.
>
> But just think how fun it is to build insecure systems?  Hundreds of
> thousands of web developers and hosting shops do it every day?
>
>
> Contact me for details if interested!
>
> --
>
> (503) 754-4452 Android
> (623) 239-3392 Skype
> (623) 688-3392 Google Voice
> **
> it-clowns.com <http://it-clowns.com/c/>
> Chief Clown
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> _______________________________________________
> Plug-security mailing list  -  Plug-security at lists.phxlinux.org
> To change settings or unsubscribe:
> http://lists.phxlinux.org/mailman/listinfo/plug-security
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.phxlinux.org/pipermail/plug-security/attachments/20130817/c8408405/attachment.html>


More information about the Plug-security mailing list