Vulnerability Development mailing list archives

SSHD Vuln Exploit X2


From: "Deb DeWolfe" <ddewolfe () hurontel on ca>
Date: Fri, 1 Feb 2002 12:22:39 -0500

The exploit x2 seemd very usefull when it came out a while back after
somebody in tesco leaked it, since then i have seen x3 and x4 clients some
have been backdoored versions and some are actually worth using such as x4,
the target lists vary alot i have seen targets for
( 2)    quick - SSH-1.5-OpenSSH-1.2
( 3)    quick - SSH-1.5-OpenSSH-1.2.2
( 4)    quick - SSH-1.5-1.2.25
( 5)    quick - SSH-1.5-1.2.26
( 6)    quick - SSH-1.5-1.2.27
( 7)    quick - SSH-1.5-1.2.30
( 8)    quick - SSH-1.5-1.2.31
( 9)    quick - SSH-1.99-OpenSSH_2.2.0p1
(10)    quick - SSH-2.99-OpenSSH_2.2.0p1
(12)    xlong - SSH-1.5-OpenSSH-1.2
(13)    xlong - SSH-1.5-OpenSSH-1.2.2
(14)    xlong - SSH-1.5-1.2.25
(15)    xlong - SSH-1.5-1.2.26
(16)    xlong - SSH-1.5-1.2.27
(17)    xlong - SSH-1.5-1.2.30
(18)    xlong - SSH-1.5-1.2.31
(19)    xlong - SSH-1.99-OpenSSH_2.2.0p1
(20)    xlong - SSH-2.99-OpenSSH_2.2.0p1
i was wondering why has nobody written targets for some of the older sshs
like 1.5-1.2.17 or 2.20 or 2.22 there old but should still work any ideas or
any newer target lists such as 2.32 2.33 ?
 i have seen up to 29 i have herd there are as many as 99 im not sure though



Current thread: