PaulDotCom mailing list archives
Re: With full read access what would you read (Part 2 -Linux Answer)
From: "Baggett, Mark" <mark.baggett () morris com>
Date: Tue, 2 Nov 2010 16:47:01 -0400
ssh private keys. Those + Tavis Ormandy's priv exploits came in very handing to me in a recent engagement. find /home -name "id_?sa" ________________________________ From: pauldotcom-bounces () mail pauldotcom com [mailto:pauldotcom-bounces () mail pauldotcom com] On Behalf Of Craig Freyman Sent: Tuesday, November 02, 2010 4:16 PM To: PaulDotCom Security Weekly Mailing List Subject: [Pauldotcom] With full read access what would you read (Part 2 -Linux Answer) This is the sister thread to Robin's question from earlier in the day. With read only access to a Linux file system, other than shadow and passwd files, what do you look for? Thanks, Craig
_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
Current thread:
- With full read access what would you read (Part 2 - Linux Answer) Craig Freyman (Nov 02)
- Re: With full read access what would you read (Part 2 -Linux Answer) Baggett, Mark (Nov 02)
- Re: With full read access what would you read (Part 2 -Linux Answer) Jim Halfpenny (Nov 02)
- Re: With full read access what would you read (Part 2 - Linux Answer) Mike Patterson (Nov 02)
- Re: With full read access what would you read (Part 2 - Linux Answer) Robin Wood (Nov 03)
- Re: With full read access what would you read (Part 2 -Linux Answer) Baggett, Mark (Nov 02)