Re: [Full-disclosure] one of my servers has been compromized

2011-12-06 Thread BH
I'm not sure if this has been said in this thread yet, but is it possible the host O/S was compromised? I have not used OpenVZ but I assume it's the same as Virtuozzo in the respect that you can just 'vzctl enter ' to get a root shell inside the container with no password (assuming you have control

Re: [Full-disclosure] THC SSL DOS tool released

2011-10-25 Thread BH
> To make it more difficult to DOS servers using SSL, the protocol could > somehow be modified to challenge the client with some useless** but > cpu-heavy calculation before the server starts acting. Of course it > must be something that does not involve heavy calculation at the > server side, oth

Re: [Full-disclosure] LinkedIn_User Account Delete using Click jacking

2011-10-07 Thread BH
Why would you post this as a word document? Thanks but no thanks. On 7/10/2011 7:52 PM, asish agarwalla wrote: > Password to access the report is: *8nj98F4h9AW* > * > * > Regards > Asish > > On Fri, Oct 7, 2011 at 5:18 PM, asish agarwalla > mailto:asishagarwa...@gmail.com>> wrote: > > Hi, > >

Re: [Full-disclosure] Verizon Wireless DNS Tunneling

2011-10-07 Thread BH
This comes in handy when travelling, I also found a few places where ICMP tunnelling works well. On 7/10/2011 6:35 PM, Dan Kaminsky wrote: > Works mostly everywhere. It's apparently enough of a pain in the butt > to deal with, and abused so infrequently, that it's left alone. > > On Fri, Oct 7, 2

Re: [Full-disclosure] sshd logins without a source

2011-09-23 Thread BH
Hi all, Thank you all for the suggestions. The systems in question are all Debian based. A typical log stanza for a login would be: Sep 23 18:51:26 test sshd[25011]: Accepted publickey for root from 10.0.1.1 port 35398 ssh2 Sep 23 18:51:27 test sshd[25011]: pam_unix(sshd:session): session open

[Full-disclosure] sshd logins without a source

2011-09-23 Thread BH
Hi, I am taking a look at a few different servers that have been rooted at around the same time. At the time of the compromise I can see in each servers sshd logs an entry like the following: Sep 22 12:57:14 test-vm sshd[25002]: pam_unix(sshd:session): session opened for user root by (uid=0) Sep