Bugtraq mailing list archives
Re: address spoof/no return packets
From: aleph1 () dfw net (Aleph One)
Date: Tue, 24 Jan 1995 19:01:26 -0600 (CST)
On Mon, 23 Jan 1995, Christopher Klaus wrote:
If you simulate a connection from trusted host and trusted account to something like the rsh port with the following command: echo "+ +" > .rhosts The attacker doesn't need to see the reply packets, but now he/she is able to rlogin/rsh in from anywhere.
This is asuming that you can reach the r-commands deamons to begin with. If the firewall filters those then you can still only have a one way connection to the machine. a1 http://underground.org
Current thread:
- Re: address spoof/no return packets Christopher Klaus (Jan 23)
- Re: address spoof/no return packets Aleph One (Jan 24)