On Nov 19, 2007 6:37 PM, Chris Zakelj <[EMAIL PROTECTED]> wrote:
> Clint Pachl wrote:
> > Is it possible for a cracker to compromise or root a machine on a
> > network that has pf enabled with the single rule "block all in"?
> I suspect you're just fishing, but in the interests of spirited debate....
> - Is "block in all" the first rule, the last rule, or somewhere in
> between?  (Yes, it DOES matter)

It does say "single" rule.

> - Does the cracker have alternate methods of entry (tty, ssh, console, etc)?

Social engineering?  Usually the weakest point.

Greg
-- 
Ticketmaster and Ticketweb suck, but everyone knows that:
http://ticketmastersucks.org
Obsession in the low desert:  http://lodesertprotosites.org
Dethink to survive - Mclusky

Reply via email to