lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200403242321.02231.indianz@indianz.ch> From: indianz at indianz.ch (IndianZ) Subject: Update: Telnet Sniff Problems Hi List Well, thanks to everybody who responded for input. I know now whats going on: it's an echoing problem - described by RFC 726, seems like the password is transmitted binary- or command-sequence-based. This is printed at the beginng of such a Telnet-Session: WILL SUPPRESS GO AHEAD DO SUPPRESS GO AHEAD WILL ECHO Does anybody know something about decrypting/decoding such transmitted strings or has anybody faced a similar situation? String-Example: ?? ?? ??#??'??$ Thanx for help. GreetZ from IndianZ mailto:indianz@...ianz.ch http://www.indianz.ch
Powered by blists - more mailing lists