Full Disclosure mailing list archives

RE: !SPAM! Automated ssh scanning


From: Ron DuFresne <dufresne () winternet com>
Date: Thu, 26 Aug 2004 09:43:13 -0500 (CDT)

On Thu, 26 Aug 2004, Richard Verwayen wrote:

On Thu, 2004-08-26 at 15:12, Todd Towles wrote:
 The kernel could be save. But with weak passwords, you are toast. Any
automated tool would test guest/guest.

Hello Todd!

You are right about the passwords, but guest is only a unprivileged
account as you may have on many prodruction machines. But they managed
to become root on this machine due to a kernel(?) exploit!
Should I then consider any woody system to be insecure to let people
work at?


If your uasers are not trustable, then they should not have access to
local systems of yours.  Once a person has a shell, then they are 95% to
root.

Thanks,


Ron DuFresne
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
        ***testing, only testing, and damn good at it too!***

OK, so you're a Ph.D.  Just don't touch anything.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: