[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: OpenSSH - remote exploit - any reported cases?
- To: misc_(_at_)_openbsd_(_dot_)_org
- Subject: Re: OpenSSH - remote exploit - any reported cases?
- From: Taveren <taveren_(_at_)_killdash9_(_dot_)_org>
- Date: Fri, 12 Jul 2002 09:41:55 -0500
On Thu, Jul 11, 2002 at 06:00:44AM -0600, Kurt Seifried wrote:
> Just that. Are there any reported cases of remote compromise of a system
> to the challenge response bug (any system, openbsd or otherwise)? Or even
> good suspicious cases?
> In other words did anyone actually actively exploit the first remote hole
> the default install in 6 years?
> Kurt Seifried, kurt_(_at_)_seifried_(_dot_)_org
> A15B BEE5 B391 B9AD B0EF
> AEB0 AD63 0B4E AD56 E574
Some may argue the relevance of this, but this guy setup a Honeypot
using OpenBSD 3.0 and was soon compromised. Twice even.
Taveren (Ren West)
GPG Public key - http://www.killdash9.org/taveren_gpgkey.pub
[demime 0.98d removed an attachment of type application/pgp-signature]
Visit your host, monkey.org