lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040730015903.5d8a60c5.derfromme@gmx.de>
From: derfromme at gmx.de (Christian Fromme)
Subject: Automated SSH login attempts?

Ali Campbell <fdisclosure@...campbell.org.uk> wrote:

> Do I take it that these things are just trying to log in using some 
> guessed password(s) ? Out of interest, do we have any idea what these 
> opportunistic passwords might be ?

As far as I have heared this is an 0day "exploit" which does nothing but
trying to bruteforce some accounts like "admin" "test" and so on with
passwords like "test" "1234" and i dont know what. 
Seems to be not too serious because noone actually has those account in
real life. ;)

Best wishes,
Christian


-- 
Christian Fromme

chris at kaner.shacknet.nu
PGP-Pubkey: http://www.informatik.fh-wiesbaden.de/~cfrom001/pgp/index.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ