[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] Automated ssh scanning
- To: full-disclosure@xxxxxxxxxxxxxxxx
- Subject: Re: [Full-Disclosure] Automated ssh scanning
- From: Tig <tigger@xxxxxxxxxxxxxxxxx>
- Date: Thu, 26 Aug 2004 22:31:35 +1000
On Wed, 25 Aug 2004 19:43:47 -0400
Gerry Eisenhaur <GEisenhaur@xxxxxxxxx> wrote:
> I am confused, you said you knew about some SSH scanning going on,
> then set up those accounts on a box. Now you are curious way that box
> got rooted?
>
> Maybe I am missing something, but it seems you already have a pretty
> good assumption of why it got rooted.
>
> The software, as you seem to know, is a few exploits, a backdoor and
> some IRC stuff(bot and proxy).
>
> /gerry
>
I think you did miss the point (which was a very good one). Basically,
once you have unprivileged access to a currently patched Woody box, you
can quickly gain root access.
I would love to see this tested against other version of Linux and *BSD
with default (and updated) installations. Anyone have a spare box and a
few hours?
-Tig
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html