[2837] in bugtraq
Re: Write-only devices (Was read only devices)
daemon@ATHENA.MIT.EDU (Jeff Uphoff)
Fri Jun 28 17:36:19 1996
Date: Fri, 28 Jun 1996 17:18:21 -0400
Reply-To: Bugtraq List <BUGTRAQ@NETSPACE.ORG>
From: Jeff Uphoff <juphoff@tarsier.cv.nrao.edu>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
In-Reply-To: Your message of Fri, June 28, 1996 13:53:54 -0400
"VK" == Valdis Kletnieks <Valdis.Kletnieks@vt.edu> writes:
VK> Actually, they *do* use old-well-known techniques. I'm willing to bet
VK> a large pizza with everything on it that most sucessful attacks are
VK> based on crack, network sniffers, and old well-known security holes
VK> like sendmail exploits. Remember that the number of truly innovative
VK> crackers is very limited - 99% of them are lame adolescent-minded
VK> wannabe's that just have toolkits of scripts and things to try....
Just got a telephone call about an hour ago reporting some break-ins
last night at another domain where the crackers exploited the WWW
cgi-bin 'phf' vulnerability mentioned in March's CA-96.06.
I tend to agree with Vladis on this one....
--Up.
--
Jeff Uphoff - systems/network admin. | juphoff@nrao.edu
National Radio Astronomy Observatory | juphoff@bofh.org.uk
Charlottesville, VA, USA | jeff.uphoff@linux.org
PGP key available at: http://www.cv.nrao.edu/~juphoff/