Re: !SPAM! [Full-Disclosure] Automated ssh scanning
On Thu, 26 Aug 2004, Jan Luehr wrote:
> Am Donnerstag, 26. August 2004 16:43 schrieb Ron DuFresne:
> > On Thu, 26 Aug 2004, Richard Verwayen wrote:
> > > On Thu, 2004-08-26 at 15:12, Todd Towles wrote:
> > > > The kernel could be save. But with weak passwords, you are toast. Any
> > > > automated tool would test guest/guest.
> > >
> > > Hello Todd!
> > >
> > > You are right about the passwords, but guest is only a unprivileged
> > > account as you may have on many prodruction machines. But they managed
> > > to become root on this machine due to a kernel(?) exploit!
> > > Should I then consider any woody system to be insecure to let people
> > > work at?
> > If your uasers are not trustable, then they should not have access to
> > local systems of yours. Once a person has a shell, then they are 95% to
> > root.
> So your point is, there a much already known local root exploits on an
> standard woody system no one cares about?
I'm quite sure the debian folks as well as the other dist maintainers
would be as interested as the offending package maintainers in finding out
the what, where and how of the compromise, to mitigates its direct threats
in the future. Will this make a fullblown installed *nix of any real
flavor secure from a similiar comprise hours, day or weeks in the future?
No, my point is that it is much more likely there is a package installed
that was sploited. If the system was as up to date and fully patched as
claimed, it's likely not a kernel sploit that got them root.
My point is this was a 'local user' compromise. There are reasons that
many list 75% and more risk is done from the 'inside' then from remote
Folks do not seem to understand the implications of 'guest' accounts, or
handing out shells to every person they happen to chat with in IRC and
"Cutting the space budget really restores my faith in humanity. It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
***testing, only testing, and damn good at it too!***
OK, so you're a Ph.D. Just don't touch anything.