Penetration Testing mailing list archives
Re: Some new SSH exploit script?
From: Paul Barrette <PaulBarrette () Videotron Ca>
Date: Thu, 08 Jun 2006 19:19:12 -0400
I totally agree the the last statement.Full port scan + a banner grab... you then know it's an SSH server... whatever the port it is runningon
Paul----- Original Message ----- From: "David M. Zendzian" <dmz () dmzs com>
To: "Michael Sierchio" <kudzu () tenebras com>; <pen-test () securityfocus com> Sent: Tuesday, June 06, 2006 7:25 PM Subject: RE: Some new SSH exploit script?I think the point being made was that by moving the port that standard ssh/port 22 brute forcers and scanners would not hit you unless they did a full scan which I would expect a real hacker or targeted attack to do.
So yes in the sence of 'real' security it doesn't gain you anything. However in the sense of annoying script kiddies or bot bets it saves you the harrassment factor.
dmz -----Original Message----- From: "Michael Sierchio" <kudzu () tenebras com> To: pen-test () securityfocus com Sent: 6/6/06 10:21 AM Subject: RE: Some new SSH exploit script? S, his bare face hanging out, wrote: > Since when is changing the default configuration of a program, especially> one that is open to the internet and has a wide history of being exploited
> in many ways, a "bid for security through obscurity" ?? Running a service on a non-standard port yields zero increase in security. That was my point.> I guess upgrading that kernel and all the other security modifications you > make to lock down your box are also bids for security through obscurity, god > forbid you deviate from the default vanilla configuration in order to better
> secure a service. > How many times have you been hacked now ? I usually don't engage with ad hominems, but I'll attribute your tone to a lapse in judgement. Prudent maintenance and hardening against common vulnerabilities are of course necessary. We've never been hacked, thanks. We use authenticated firewall traversal for any non-public services. Public services are hosted in a DMZ. ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst'sChoice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst'sChoice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
Current thread:
- Re: Some new SSH exploit script?, (continued)
- Re: Some new SSH exploit script? Paul Robertson (Jun 09)
- Re: Some new SSH exploit script? R. DuFresne (Jun 09)
- Re: Some new SSH exploit script? litch (Jun 07)
- Unix auditing tools - Windows based. Serge Vondandamo (Jun 08)
- Re: Unix auditing tools - Windows based. Sol Invictus (Jun 08)
- RE: Unix auditing tools - Windows based. Meidinger Chris (Jun 08)
- RE: Unix auditing tools - Windows based. Serge Vondandamo (Jun 08)
- Re: Unix auditing tools - Windows based. Sol Invictus (Jun 09)
- Re: Unix auditing tools - Windows based. Micha Borrmann (Jun 08)
- Re: Some new SSH exploit script? Paul Barrette (Jun 08)
- Re: Some new SSH exploit script? Adam.Chesnutt (Jun 09)
- Re: Some new SSH exploit script? Dotzero (Jun 09)
- Re: Some new SSH exploit script? Christine Kronberg (Jun 10)
- Re: Some new SSH exploit script? Art Cooper (Jun 09)