[<prev] [next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.58.0512151555360.5169@redclaw.org.uk>
Date: Thu Dec 15 15:58:44 2005
From: dragon at dragons.org.uk (Gaz Wilson)
Subject: POC tools?
I'm sorry to post this on FD, but I could do with an answer and other lists I
am subbed to seem fairly quiet at the moment (everyone xmas shopping?)
Anyway, we juist acquired a smaller company and some of their boxes are a bit
out of date, so I was wanting to take the opporuinity to set up a workshop
with the staff we are keeping to discuss security practices etc, and along
with some telnet session hijacking stuff, I also want to show some SSH
exploits as a proof of concept.
One of the internal boxes is running OpenSSH 3.1p1, and I was wondering
if anyone has any tools to exploit this as a teaching aid to our new
staff members?
Replies off-list welcome if preferred.
Many thanks
GW
--
/ Gary Wilson, aka dragon/dragonlord/dragonv480 \
.'(_.------. e: dragon@...thernscum.org.uk MSN: dragonv480 .------._)`.
< _ | Skype:dragonv480 ICQ:342070475 AIM:dragonv480 | _ >
`.( `------' w: http://volvo480.northernscum.org.uk `------' ).'
\ w: http://www.northernscum.org.uk /
Powered by blists - more mailing lists