lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed Apr 12 00:04:59 2006
From: ian.t7 at hotmail.co.uk (Ian stuart Turnbull)
Subject: Shell accounts

Thanks for your answer.
Exactly the info I was hoping to get.

Ian t

>From: "Anthony Ettinger" <aettinger@...ualumni.org>
>To: "Ian stuart Turnbull" <ian.t7@...mail.co.uk>
>CC: full-disclosure@...ts.grok.org.uk
>Subject: Re: [Full-disclosure] Shell accounts
>Date: Tue, 11 Apr 2006 15:32:12 -0700
>MIME-Version: 1.0
>Received: from uproxy.gmail.com ([66.249.92.172]) by 
>bay0-pamc1-f3.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 
>11 Apr 2006 15:32:13 -0700
>Received: by uproxy.gmail.com with SMTP id u2so802968uge        for 
><ian.t7@...mail.co.uk>; Tue, 11 Apr 2006 15:32:13 -0700 (PDT)
>Received: by 10.78.40.10 with SMTP id n10mr251821hun;        Tue, 11 Apr 
>2006 15:32:12 -0700 (PDT)
>Received: by 10.78.18.20 with HTTP; Tue, 11 Apr 2006 15:32:12 -0700 (PDT)
>X-Message-Info: JGTYoYF78jEHjJx36Oi8+Z3TmmkSEdPtfpLB7P/ybN8=
>DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws;        s=beta; 
>d=gmail.com;        
>h=received:message-id:date:from:sender:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; 
>        
>b=RtlwS2N2FyTEDMKsM8si6NwBMSXAwMGJM716Vy1AJc6fmj/hE6CH5xghEWA6szjO1kLbH49K3oH5hPYx3pUchbwjMKUlhHVnGpGTHJ8h34ev+mjRJCnu9zsVbZESkakJM/56vkDoIm3s7h3LAspyofn+HnqPU1fh8BKTV1MivYI=
>References: <BAY112-F227EBD62579F66106468D299CD0@....gbl>
>Return-Path: ettinger@...il.com
>X-OriginalArrivalTime: 11 Apr 2006 22:32:13.0976 (UTC) 
>FILETIME=[C7D68180:01C65DB7]
>
>simply having a shell account does in itself gaurantee anonymity.
>
>Whatever you read was probably talking about tunnelling. so you
>connected to target host via N number of hops (other shell accounts on
>different boxes). Doing a trace would require logs from N number of
>machines.
>
>This is more or less what the tor.eff.org network does, I believe with
>only 3 hops though + encryption between tor nodes. There are some
>give-aways though with tor, like DNS leakage which may or may not give
>you away.
>
>
>
>On 4/11/06, Ian stuart Turnbull <ian.t7@...mail.co.uk> wrote:
> > Sorry folks,
> > my inquisitiveness has got the better of me again.
> > After reading some info on hacking it refernces getting a Shell account.
> > Is this a unix type bash/bourne shell? It mentions that to remain 
>anonymous
> > you will need a Shell account. I know there are a number of places 
>offering
> > free shell accts some with an out to the internet others without.
> >
> > Suppose I had a friend who had a Linux connected to the internet and I 
>got
> > him to set me up a username. As long as his machine didn't do any 
>logging
> > [and he pretended not to know of anyone using this account] would I - 
>using
> > sssh to connect] be traceable.
> >
> > No I'm not planning on doing any hacking or causing mischief. Though I'd
> > love to know who's trying to get into my machine... but thats another
> > story!!
> >
> > Ian t
> >
> > _________________________________________________________________
> > Are you using the latest version of MSN Messenger? Download MSN 
>Messenger
> > 7.5 today! http://join.msn.com/messenger/overview
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> >
> >
>
>
>--
>Anthony Ettinger
>Signature: http://chovy.dyndns.org/hcard.html

_________________________________________________________________
Are you using the latest version of MSN Messenger? Download MSN Messenger 
7.5 today! http://join.msn.com/messenger/overview

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ