I am assuming that most of you have heard that there is a) a new SSH vulnerability and b) that there appears to be an exploit available. (See the link below for more information).
What I would like to know is if anybody has seen somewhere I can get my hands on the exploit. I would like to see what it looks like when it attacks a machine. A friend of my might have already been hit. He saw some unusual activity on his system and pulled the network connection, but we are not sure if he has been root'd or not. I would like to try this on one of my systems and see what shows in the logs. Thanks, Garl http://slashdot.org/articles/03/09/16/1327248.shtml?tid=126&tid=172 ======================================================================= Garl R. Grigsby Senior Customer Applications Engineer - I-DEAS CAE & FEMAP Support ----------------------------------------------------------------------- EDS PLM Solutions Phone: (800) 955-0000 Global Technical Access Center FAX: (541) 342-8277 1750 Willow Creek Circle Email: [EMAIL PROTECTED] Eugene, OR 97402 Internet: http://support.plms-eds.com ======================================================================= -FEA makes a good engineer great, and a poor engineer dangerous- ======================================================================= _______________________________________________ EuG-LUG mailing list [EMAIL PROTECTED] http://mailman.efn.org/cgi-bin/listinfo/eug-lug
