this kid spent many hard hours reading man pages looking for 0day, gives it
to us along with hello world python networking code ( that is incapable of
parsing replies so any unintended behaviour causes exit), and you are going
to bash it?  You are probably just jealous you do not have the technical
ability required to find these types of vulnerabilities and write reliable
remote exploits for them.

On Dec 14, 2007 3:11 PM, <[EMAIL PROTECTED]> wrote:

> On Fri, 14 Dec 2007 13:52:33 CST, Adam N said:
>
> > No, the idea is that you are a user with no login access, only FTP.
> > By doing this, you get shell access (with sane privileges, thankfully)
> when
> > you're supposed to only have FTP.
>
> And this is why, for at least 2 decades, it's been recommended that people
> doing the "FTP-only user" put the writeable directories for that user
> under
> ~ftp/$USER or some such, rather than ~$USER, and make the login shell for
> the
> user /bin/false, and other such things.
>
> For bonus points - if it's an FTP-only userid, why does the sysadmin not
> have e-mail for the userid *blocked*? After all, if they can't login, they
> can't *read* any mail that gets delivered to the system. Even if you fix
> the MTA to drop mail directly in $HOME/mbox, it's the rare FTP daemon that
> understands the locking needed to make this work - that's the primary
> reason why the POP protocol was invented.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to