[Plug-security] Exploitable Virtual Target Builders Wanted
Michael Havens
bmike1 at gmail.com
Sat Aug 17 14:32:13 MST 2013
yipee.... my first security email!
:-)~MIKE~(-:
On Sat, Aug 17, 2013 at 2:11 PM, Lisa Kachold <lisakachold at obnosis.com>wrote:
> We have a great ESXi server running in the DeVry Rack if you have a
> virtual host to present to the community for public exploit?
>
> This is especially great because you don't have to stand up and talk if
> you don't want to. We will assign it an IP and let them at it.
>
> It IS especially nice when we expose why the system was exploitable after
> and what small systems changes would have made it rock solid secure, but
> you don't have to do that if you don't want to; we have a whole community
> of security professionals willing to talk on those subjects.
>
> But just think how fun it is to build insecure systems? Hundreds of
> thousands of web developers and hosting shops do it every day?
>
>
> Contact me for details if interested!
>
> --
>
> (503) 754-4452 Android
> (623) 239-3392 Skype
> (623) 688-3392 Google Voice
> **
> it-clowns.com <http://it-clowns.com/c/>
> Chief Clown
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> _______________________________________________
> Plug-security mailing list - Plug-security at lists.phxlinux.org
> To change settings or unsubscribe:
> http://lists.phxlinux.org/mailman/listinfo/plug-security
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.phxlinux.org/pipermail/plug-security/attachments/20130817/a8a680ae/attachment.html>
More information about the Plug-security
mailing list