-ray wrote:
> On Wed, 27 Oct 2004, Will Hill wrote:
> Well the PuTTY vulnerability needs a trojaned ssh server to work anyway.  
> I don't know why you break into a unix ssh server to hack windows boxes... 
> it'd be easier to just start with the windows boxes, hahaha.

Actually it needs only to spoof name resolution the way I read the warning.

> 
> And if the ssh server i'm logging into is compromised, the Windows box 
> is the LAST thing i'm worried about.  Kinda like in "Speed" after Keanu 
> crashed the guy's Jag then asked to borrow his phone, the guy says 'Take 
> the damn phone!'.
> 


-- 
Scott Harney <[EMAIL PROTECTED]>
"Asking the wrong questions is the leading cause of wrong answers"
gpg key fingerprint=7125 0BD3 8EC4 08D7 321D CEE9 F024 7DA6 0BC7 94E5

Reply via email to