Penetration Testing mailing list archives
Re: OpenSSH exploit
From: Marco Monicelli <marco.monicelli () marcegaglia com>
Date: 27-Sep-2005 17:06:24 CEDT
I never tested this exploit before but if you read carefully to point n. 5: "5. If the sploit worked, you can connect to port 128 in another terminal" This means the exploit is not 100% sure working. I bet you followed the instructions correctly, then the answer to your question is: the exploit didn't work. Reasons could be hundreds... Cheers Marco Hi there, I am trying to exploit a vulnerable version of OpenSSH (3.1p1) through challenge-response buffer overflow (BID 5093). I have already checked it meets the pre-requisites (keyboard-interactive is enabled). I have compiled the modified version of the client as explained in http://downloads.securityfocus.com/vulnerabilities/exploits/openssh3.1obsdexp.txt. But when it comes to run it (./ssh root:skey@[SERVER]), the exploit doesn't work: it asks for the password, as with the original version of ssh. The target platform is Red Hat Linux. Has anyone sucessfully exploited this overflow in Linux? Thanks in advance. Greetings, RSMC ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 ------------------------------------------------------------------------------- ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- OpenSSH exploit Rafael San Miguel (Sep 27)
- Re: OpenSSH exploit Marco Monicelli (Sep 28)