lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <3F6DBB8F.9060603@texoma.net>
From: vaden at texoma.net (Larry Vaden)
Subject: Snort and SourceFire Compromised

Brian wrote:

>Yes, this was a LONG time ago.  Note that ALL of the date timestamps are 
>dashed out.  Gee, I wonder why.  As well as normal incident response,
>the entire snort team did a major audit of snort at that time for anything 
>injected.
>
>BTW, for those of you wanting the original sneeze, its still available 
>online at http://snort.sourceforge.net/sneeze-1.0.tar 
>  
>
Hi Brian,

Are you willing to share anything about the incident which would help 
those of us who naturally think we're a step or two behind your org in 
preventing compromises?

e.g., did any of the following play a role?

.rhosts
weak passwords
yada yada

rgds/ldv



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ