On Mon, Apr 12, 1999 at 04:35:38PM -0500, James Thompson wrote:
> On Mon, 12 Apr 1999, Chuck Milam wrote:
> > 
> > Find out what services each machine is running, and then begin trying out
> > known exploits for the services that were discovered.
> > 
> 
> That's what bothers me.  There aren't any know exploits for any remotely
> recent sshd. Are there?
> 
Which is why they include it in the scan, on the off chance that you are
running an old version that is exploitable.

-- 
        Jason Kohles -- [EMAIL PROTECTED]
        http://www.mediabang.com/

    Unix is like a toll road on which you have to stop every 50 feet to
    pay another nickel.  But hey!  You only feel 5 cents poorer each time.
        --Larry Wall in <[EMAIL PROTECTED]>

Reply via email to