lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: dotslash at snosoft.com (KF)
Subject: HP Tandem NonStop servers

Well if its a unix based OS I would start with a suid / sgid listing... 
as well as checking the listening services...

Shoot me a find / -perm -4000 and a find / -perm -2000 along with a 
netstat -a and we can go from there.

If you are willing to give up a shell I'll beat on the suids myself for 
a bit. =]
-KF

Tom Knienieder wrote:
> On Thu, 21 Aug 2003, KF wrote:
> 
> 
>>What OS do they run?
> 
> 
> NonStop Kernel is UNIX based and was developed by Tandem in the 90's
> 
> 
> 
>>Everyone knows that all HP issues are only Potential issues thus making
>>them rock solid. (sarcasm).
>>-KF
>>
>>david king wrote:
>>
>>>I was told by a few that the HP tandem NonStop servers are the most
>>>secure servers ?
>>>
>>>i have got myself a box and have been tasksed to do a security review.
>>>
>>>Does anyone have any recomdations/idea how i should go abt doing it ?
>>>
>>>
>>>------------------------------------------------------------------------
>>>*Yahoo! Plus - For a better Internet experience*
>>><http://uk.rd.yahoo.com/evt=8613/*http://uk.yahoo.com/mail/tagline_plus/?http://uk.promotions.yahoo.com/yplus/btoffer.html>
>>
>>_______________________________________________
>>Full-Disclosure - We believe in it.
>>Charter: http://lists.netsys.com/full-disclosure-charter.html
>>
> 
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ