[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] POC tools?
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] POC tools?
- From: Gaz Wilson <dragon@xxxxxxxxxxxxxx>
- Date: Thu, 15 Dec 2005 15:58:35 +0000 (GMT)
I'm sorry to post this on FD, but I could do with an answer and other lists I
am subbed to seem fairly quiet at the moment (everyone xmas shopping?)
Anyway, we juist acquired a smaller company and some of their boxes are a bit
out of date, so I was wanting to take the opporuinity to set up a workshop
with the staff we are keeping to discuss security practices etc, and along
with some telnet session hijacking stuff, I also want to show some SSH
exploits as a proof of concept.
One of the internal boxes is running OpenSSH 3.1p1, and I was wondering
if anyone has any tools to exploit this as a teaching aid to our new
staff members?
Replies off-list welcome if preferred.
Many thanks
GW
--
/ Gary Wilson, aka dragon/dragonlord/dragonv480 \
.'(_.------. e: dragon@xxxxxxxxxxxxxxxxxxx MSN: dragonv480 .------._)`.
< _ | Skype:dragonv480 ICQ:342070475 AIM:dragonv480 | _ >
`.( `------' w: http://volvo480.northernscum.org.uk `------' ).'
\ w: http://www.northernscum.org.uk /
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/