On Mon, 12 Apr 1999, Chuck Milam wrote:
> 
> Find out what services each machine is running, and then begin trying out
> known exploits for the services that were discovered.
> 

That's what bothers me.  There aren't any know exploits for any remotely
recent sshd. Are there?

->->->->->->->->->->->->->->->->->->---<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<
James Thompson    138 Cardwell Hall  Manhattan, Ks   66506    785-532-0561 
Kansas State University                          Department of Mathematics
->->->->->->->->->->->->->->->->->->---<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<

Reply via email to