[747] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Hijacking tool

daemon@ATHENA.MIT.EDU (Jim Duncan)
Tue Jan 24 19:28:12 1995

To: Eric Conrad <econrad@bu.edu>
Cc: Paul Ferguson <paul@hawksbill.sprintmrn.com>, bugtraq@fc.net
In-Reply-To: Your message of "Tue, 24 Jan 1995 11:37:28 EST."
             <Pine.SUN.3.90.950124112918.4999B-100000@it> 
Date: Tue, 24 Jan 1995 17:34:17 -0500
From: Jim Duncan <jim@math.psu.edu>

Eric Conrad writes:
> The measures described to prevent this (disabling loadable kernel 
> modules) seem pointless -- if the attackers have root, they can 
> rebuild the kernel to do anything they want. 

Hacker's don't reboot -- it generates too much attention.  They are much
happier to use kernel-loadable modules and keep quiet.

This is one reason I hated the idea of kernel-loadable modules when they
were introduced.  But everything has its good and bad effects.

	Jim



home help back first fref pref prev next nref lref last post