Are We Sexy?

"When security is not your beretta"

Mon Dec 27 15:38:39 CET 2004

Upgraded FC3 srpm for kernel 2.6.9 grsec 2.0.3 (/STUFF/rpms/)

Mon Nov 29 22:46:22 CET 2004

RoMaNSoFt releases twiki 0day after vulnerability was discovered in the wild by forensics over box.

Read twiki.txt and twiki2.txt in /STUFF/txt, exploit available in /STUFF/olds

Tue Nov 9 20:04:09 CET 2004

Section /STUFF/ updated, pay special atention to /fun CCC, NouFiar, viruscorporation and /rpms bash+syslog version for FC3.

Mon Oct 18 05:30:14 CEST 2004

This Saturday (Oct 16th), we celebrated our c0n with the following assistants: d3ivid, FreeMind, ergosum, Twrch, RoMaNSoFt, Pci, dab, bladi, ds, FREEDOM, Crg, aT4r, Aule, axis and of course ... loads of girls

Wed Sep 15 01:05:43 CEST 2004

The good news for this week are;
Some of our guys got married with a princess Congratulations bro!!! ;-)

df@etnies gave us new look again! thx a lot man. Docs sections up again.

Thu Sep 9 16:39:11 CEST 2004

!dSR is announcing RainbowCrack project:

Tue Aug 3 13:15:16 CEST 2004

!dSR is now mirrorning Infohacking advizories ;-) here the link:

Thu Jul 22 20:47:10 CEST 2004

Our website is back after some "holidays".
We have nothing to do with the hacks that we published. We are not the authors of the hacks, and we dont agree or disagree with them. dSR only informs... or not?.

Wed Jun 2 20:30:09 CEST 2004

Also dab confirmed that openwebmail is vulnerable to the XSS.

Sun May 30 06:48:14 CEST 2004

Doing an exception in !dSR non-disclosure policy, RoMaNSoFt publishes "SquirrelMail "Content-Type" XSS vulnerability" Advisory:

Sun May 30 05:13:15 CEST 2004

Somebody is doing nasty things (majorly mass defacements on PHP-Nuke based portals) and using RoMaNSoFt`s nick to incriminate him. We've collected more data about the impostor (photo included). We'd simply like to state that no, RoMaNSoFt is not that person and We don't even know him. Please, don't mistake that script-kiddie with the real RoMaNSoFt. Profile

Sat May 29 00:18:41 CEST 2004

NEWS! -> and were owned! to see illiCe and holer0 homedirs.

Fri May 28 11:40:37 CEST 2004

Irc-hispano drop #dSR, couse we`ve falsely accusated to hack spanish servers. Some guy called illiCe ( claims that he was the author of the lies for close #dsr. After "unforbid" the channel was registered and stolen by holer0 ( Some hours later we recover it. Thx to Yandros and EcHiNooSS for the help

Sun May 23 00:18:41 CEST 2004 was rooted yesterday by an anonymous hax0r.

Fri May 21 00:09:41 CEST 2004

There are some issues about the irc-hispano: (In spanish) ->

Mon May 10 08:56:32 CEST 2004 was pwned, defaced and exposed by the pr0j3kt m4yh3m.

Mirror ->

Thu Mar 11 09:10:00 CET 2004

!dSR c0n finished... with the following assistants: at4r, axis, ^talli^, hgates, Homs, Jacobo, DrBlasco, RoMaNSoFt, Isabella, dab, Mabel, Pci, Patricia, DS, bladi, bracu, Ari, ergosum and Crg...

Mon Apr 19 17:40:08 CEST 2004

We have new logo thx to df@etnies ;)***

Wed Apr 14 20:58:25 CEST 2004

Drunken Security Research!!!!!! Call 4 glasses - new c0n 24th April 9:00pm in the O'Neal (near to Sol) Madrid.

Mon Apr 12 15:04:53 CEST 2004 linked to SHIT Now the ip addr is completely hidden for any user.

Sat Mar 20 20:51:16 CET 2004

Doc`s updated, we recommended to read The Art of Exploitation and s1-book(Network Security Assessment) into security section. Mailto Crg for l/p

Thu Mar 11 09:10:00 CET 2004

OFF-TOPIC-> Terrorist Attack - Madrid Rail line


Sun Mar 7 05:48:47 CET 2004

c0n Finished, assistants: GriYo, RoMaNsoFt, Pci, dab, ergosum, DS, bladi, ^talli^, vladita, FREEDOM, bRaCu, [back], Crg and our pretty girls. See you in the next one! (Drnqen Scurti R3searcherz)

Thu Feb 19 00:00:28 CET 2004

BREAKING NEWS! !dSR c0n 28feb 2004 - 21:00 PM - QUIET MAN!!! (Madrid - Spain) - CALL 4 GLASSES! KULUNGELEEEEEEEE! PH34R!! Drunken Security Research!!!

Sat Feb 14 17:44:49 CET 2004

Available some lame RPM that could help anyone:

Fri Feb 13 13:33:37 CET 2004

poor eyala gdb -c ./private/security/msv_sspi/
core Core was generated by `vi nlmain.c'. HOSTNAME=voltaire LOGNAME=eyala REPLYTO=eyala at ORGANIZATION=Mainsoft Co. Ltd. PWD=/usr/ms/win2k_sp1/private/security/msv_sspi