WikiLeaks CIA Exploits: FreeBSD References Within

grarpamp grarpamp at gmail.com
Thu Mar 9 10:38:46 UTC 2017


On Wed, Mar 8, 2017 at 10:52 AM, Dag-Erling Smørgrav <des at des.no> wrote:
> grarpamp <grarpamp at gmail.com> writes:
>> https://search.wikileaks.org/?q=freebsd
> That doesn't indicate a vulnerability.  Shell code is what you use to

Yep, sec folks are aware of the difference between
sample and exploit code, and vulnerabilities.
https://www.freebsd.org/security/advisories.html
http://shell-storm.org/shellcode/

The post wasn't meant to "indicate a vulnerability".
But as a heads up that maybe some might end up being
published there. On the other hand, there are countless eyes
on it, so OS vendors will find out in time,
even if they aren't eyeballing it themselves.

> legal advice

Let us all get legal advice before living, as it might entail risks ;)
Lots of sites offer a variety of advice for those facing risks.
Here are some related to employers, browsing, and law...
https://intelexit.org/ https://www.youtube.com/watch?v=fklxuoBXXqw
https://www.torproject.org/ https://geti2p.net/
https://www.eff.org/
IANAGPA, but they do exist.

(Btw, the pentest turned out to be old Nessus and Metasploit stuff.)


More information about the freebsd-questions mailing list