lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: BlueBoar at thievco.com (Blue Boar) Subject: Betr.: RE: Automated ssh scanning VeNoMouS wrote: > LOL that file is infected with rst.b and you ran it?? hope it was inside > a chroot() other wise time to replace every elf binary >:) Who, me? No. I opened it with Notepad, as indicated in my mail. If you've been following the thread, you'll see the bit where it was run is a paste from an earlier note showing the history file. In this case, it was the original attacker/script that did so, I believe. BB
Powered by blists - more mailing lists