On Mon, 19 May 2008 13:51:29 EDT, "Garrett M. Groff" said: > Generating pseudo-random numbers isn't hard given a good API, but writing > that API is non-trivial (assuming you want high entropy/low > predictability). And, apparently, screwing up that API is also very easy. Of course, if you're trying to write a PoC, you don't need to know how to code the API - all you need to do is grab the source for the key-tester that got shipped as part of the OpenSSH patch and snarf out the nicely enumerated list of all vulnerable keys, and use that list as the brute-forcer, 6 per connection attempt. ;)
Attachment:
pgpHhk9k333aL.pgp
Description: PGP signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/