CR0.ORG SERVER
Our crawlers found that the main root page on cr0.org took four hundred and thirty-seven milliseconds to download. I identified a SSL certificate, so therefore we consider this site secure.
SERVER SOFTWARE AND ENCODING
We revealed that cr0.org is weilding the Apache/2.4.10 os.SITE TITLE
www.cr0.org, homepage of Julien TinnesDESCRIPTION
A tiny, available and reliable remote command execution server and client for emergency situations. Embracing modern technologies, I now have a blog. Compiled dynamically within Metasploit using Metasm and sample exploit for Linksys WRT54G. Some tty-related tools for pen-testers a generic backdoor for programs asking interactively for a password such as sudo. And a program to steal a tty from running processes. We also wrote an article in this MISC issue. A DebianUbuntu repository with grsecurity.PARSED CONTENT
The web site had the following in the homepage, "A tiny, available and reliable remote command execution server and client for emergency situations." I noticed that the web site stated " Embracing modern technologies, I now have a blog." They also said " Compiled dynamically within Metasploit using Metasm and sample exploit for Linksys WRT54G. Some tty-related tools for pen-testers a generic backdoor for programs asking interactively for a password such as sudo. And a program to steal a tty from running processes. We also wrote an article in this MISC issue. A DebianUbuntu repository with grsecurity." The meta header had cr0.org security exploits slipfest kernelsec metasm dtdumper julien tinnes as the first optimized keyword.