Full Disclosure mailing list archives
RE: Automated ssh scanning
From: "Todd Towles" <toddtowles () brookshires com>
Date: Thu, 26 Aug 2004 09:03:46 -0500
Sorry, didn't see the other messages. So it get local access thru guest/guest and then gained root with a local exploit. Any ideas what it is? -----Original Message----- From: full-disclosure-admin () lists netsys com [mailto:full-disclosure-admin () lists netsys com] On Behalf Of Todd Towles Sent: Thursday, August 26, 2004 8:12 AM To: Richard Verwayen; FD Subject: RE: !SPAM! [Full-disclosure] Automated ssh scanning The kernel could be save. But with weak passwords, you are toast. Any automated tool would test guest/guest. -----Original Message----- From: full-disclosure-admin () lists netsys com [mailto:full-disclosure-admin () lists netsys com] On Behalf Of Richard Verwayen Sent: Thursday, August 26, 2004 6:08 AM To: 'FD' Subject: RE: !SPAM! [Full-disclosure] Automated ssh scanning On Thu, 2004-08-26 at 11:47, Yaakov Yehudi wrote:
In spite of many reports to the contrary, Linux is _not_ secure by
default.
Did you harden it? There is a lot of documentation on the web as to how to go about it. YY
Hello Yaakov, This system was a pure debian woody none-production one with all services disabled - just ssh was left open in order to see for what purpose the scan was! Yes, there was a guest account with a weak passwort (guest) on it! And yes, they logged in and became root in no time. But I thought the kernel compiled from the latest debian woody kernel-source could be considered to be save. But I was wrong! So I posted the tools used by the attackers to this list and also to the debian security team. Richard _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Re: Automated ssh scanning, (continued)
- Re: Automated ssh scanning Richard Verwayen (Aug 26)
- Re: Automated ssh scanning Henrik Persson (Aug 26)
- Re: Automated ssh scanning Richard Verwayen (Aug 26)
- Re: Automated ssh scanning VeNoMouS (Aug 25)
- Re: Automated ssh scanning David Vincent (Aug 25)
- Re: Automated ssh scanning Richard Verwayen (Aug 26)
- Re: Automated ssh scanning andreas (Aug 26)
- Re: Automated ssh scanning Richard Verwayen (Aug 26)
- RE: !SPAM! Automated ssh scanning Yaakov Yehudi (Aug 26)
- RE: !SPAM! Automated ssh scanning Richard Verwayen (Aug 26)
- Re: Automated ssh scanning Frank Knobbe (Aug 26)
- Re: Automated ssh scanning Jan Luehr (Aug 26)
- RE: Automated ssh scanning Todd Towles (Aug 26)
- RE: Automated ssh scanning Todd Towles (Aug 26)
- Re: Automated ssh scanning KF_lists (Aug 26)
- Re: Automated ssh scanning Richard Verwayen (Aug 26)
- Re: Automated ssh scanning Valdis . Kletnieks (Aug 26)
- RE: Automated ssh scanning Ron DuFresne (Aug 26)
- Re: Automated ssh scanning Deigo Dude (Aug 26)
- Re: Automated ssh scanning KF_lists (Aug 26)
- RE: Automated ssh scanning Todd Towles (Aug 26)
- Re: Automated ssh scanning Tremaine (Aug 26)
- Re: Automated ssh scanning Deigo Dude (Aug 26)
- Re: Automated ssh scanning Gary E. Miller (Aug 26)
- Re: Automated ssh scanning Tremaine (Aug 26)