lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20031219234719.GD57562@netpublishing.com>
From: ggilliss at netpublishing.com (Gregory A. Gilliss)
Subject: 13 NASA Servers Hacked

I'm not surprised. I have been inside NASA . While the people there stuck me
as both intelligent and conscientious, they are forced (due to lack of funds)
to keep ancient technology online for longer than they ought to, and have
little say in how secure it may be (at least the outward facing stuff - 
no comment on their internal network). Since they are administratively kept
from "staying current" with patches etc., this is inevitable. So compromising 
13 servers sounds like par for the course.

Pity, since NASA is (mostly) R&D and their outward facing stuff is (mostly) 
scientific and educational, so that means that some kids aren't going to get
to see (insert cool space technology here) because some k13313z decided that
r00ting one box wasn't enough.

G

On or about 2003.12.19 10:12:45 +0000, Simon Smith (simon@...soft.com) said:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Greetings,
> I've recently been told that 13 NASA servers were compromised by 
> some group in Brazil?  Can anyone point me to any articles on this incident?
> - -- 
> Regards,

-- 
Gregory A. Gilliss, CISSP                              E-mail: greg@...liss.com
Computer Security                             WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ