I am assuming that most of you have heard that there is a) a new SSH vulnerability and 
b) that there appears to be an exploit available. (See the link below for more 
information). 

What I would like to know is if anybody has seen somewhere I can get my hands on the 
exploit. I would like to see what it looks like when it attacks a machine. A friend of 
my might have already been hit. He saw some unusual activity on his system and pulled 
the network connection, but we are not sure if he has been root'd or not. I would like 
to try this on one of my systems and see what shows in the logs.

Thanks,
Garl

http://slashdot.org/articles/03/09/16/1327248.shtml?tid=126&tid=172

=======================================================================
Garl R. Grigsby
Senior Customer Applications Engineer - I-DEAS CAE & FEMAP Support 
-----------------------------------------------------------------------
EDS PLM Solutions                                 Phone: (800) 955-0000 
Global Technical Access Center                      FAX: (541) 342-8277
1750 Willow Creek Circle               Email: [EMAIL PROTECTED]
Eugene, OR 97402                  Internet: http://support.plms-eds.com
=======================================================================
   -FEA makes a good engineer great, and a poor engineer dangerous-
=======================================================================

_______________________________________________
EuG-LUG mailing list
[EMAIL PROTECTED]
http://mailman.efn.org/cgi-bin/listinfo/eug-lug

Reply via email to