[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA 045-1] ntp remote root exploit fixed

Peter Cordes wrote:

> yeti:~$ grep 2064 /usr/share/nmap/nmap-services
> distrib-net-losers 2064/tcp  # A group of lamers working on a silly
> closed-source client for solving the RSA cryptographic challenge.  This is
> the keyblock proxy port.
>  It used to be s/losers/assholes/ and s/silly/stupid/, IIRC.  I don't know
> when it got toned down :)  It's always funny when people leave their
> opinions in their software.

And I've seen more than one of those free web based port scanner utilities that
run on nmap underneath reporting that exact output when it finds a server =)


Reply to: