On Mon, Apr 12, 1999 at 04:35:38PM -0500, James Thompson wrote:
> On Mon, 12 Apr 1999, Chuck Milam wrote:
> >
> > Find out what services each machine is running, and then begin trying out
> > known exploits for the services that were discovered.
> >
>
> That's what bothers me. There aren't any know exploits for any remotely
> recent sshd. Are there?
>
Which is why they include it in the scan, on the off chance that you are
running an old version that is exploitable.
--
Jason Kohles -- [EMAIL PROTECTED]
http://www.mediabang.com/
Unix is like a toll road on which you have to stop every 50 feet to
pay another nickel. But hey! You only feel 5 cents poorer each time.
--Larry Wall in <[EMAIL PROTECTED]>