lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed Nov 23 21:57:52 2005
From: ad at heapoverflow.com (ad@...poverflow.com)
Subject: SANS Top 20: Mac OS X?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Nor a lot are running the osxvnc without passwd at all..

- -----Message d'origine-----
De : full-disclosure-bounces@...ts.grok.org.uk
[mailto:full-disclosure-bounces@...ts.grok.org.uk] De la part de Michael
Holstein
Envoy? : mercredi 23 novembre 2005 21:46
? : full-disclosure@...ts.grok.org.uk
Objet : Re: [Full-disclosure] SANS Top 20: Mac OS X?

> The problem is that there are enough OS X boxes on networks that are 
> *NOT* patched, firewalled, and configured that they pose a clear and 
> present danger to the networks they reside on.

I second that. I've seen more and more OS X servers get nailed lately
because they have SSH turned on and bad passwords.

The fact that Mac users are an elitist group that believes themselves
invulnerable to viruses/etc doesn't help either.

~Mike.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)
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=XzDg
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ