Quote:
Originally posted by StupidNewbie
perfect proof would be hacking something, seeing as how deepsy apparently couldn't hack and you said you used some DCOM exploit right?
|
I'm not going to publicly hack something, that would be rather stupid. However, I had a hand in improving/rewriting that dcom exploit (check out packetstorm - oc192-dcom.c for the occassional reference to drg).