Re: OpenSSH 3.7

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Lucas Albers wrote:

This is an abolutely worhtless exploit.
So they can tell if an account exists on the system.


It's much easier to break into a system if you can determine whether an account exists or not. If you can get into a system as an unpriviledged user then you can exploit local weaknesses to get to root. For example, you might be able to mount a dictionary attack on a password file, you might find a weak root-setuid program, you might be able to install a tojan horse.

If you can determine the existance of an account you are well on the way to being able to get into a system -- think about it. Suppose your collegue has a weak password based on something easily guessable. If the hacker can get determine the existance of a username, then he's practically in -- the password is not a barrier.

It's only a worthless exploit to someone not interested in hacking your system.

jch


-- Shrike-list mailing list Shrike-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/shrike-list

[Index of Archives]     [Fedora Users]     [Centos Users]     [Kernel Development]     [Red Hat Install]     [Red Hat Watch]     [Red Hat Development]     [Red Hat Phoebe Beta]     [Yosemite Forum]     [Fedora Discussion]     [Gimp]     [Stuff]     [Yosemite News]

  Powered by Linux