I'm not sure if this has been said in this thread yet, but is it
possible the host O/S was compromised? I have not used OpenVZ but I
assume it's the same as Virtuozzo in the respect that you can just
'vzctl enter ' to get a root shell inside the container with no
password (assuming you have control
> To make it more difficult to DOS servers using SSL, the protocol could
> somehow be modified to challenge the client with some useless** but
> cpu-heavy calculation before the server starts acting. Of course it
> must be something that does not involve heavy calculation at the
> server side, oth
Why would you post this as a word document?
Thanks but no thanks.
On 7/10/2011 7:52 PM, asish agarwalla wrote:
> Password to access the report is: *8nj98F4h9AW*
> *
> *
> Regards
> Asish
>
> On Fri, Oct 7, 2011 at 5:18 PM, asish agarwalla
> mailto:asishagarwa...@gmail.com>> wrote:
>
> Hi,
>
>
This comes in handy when travelling, I also found a few places where
ICMP tunnelling works well.
On 7/10/2011 6:35 PM, Dan Kaminsky wrote:
> Works mostly everywhere. It's apparently enough of a pain in the butt
> to deal with, and abused so infrequently, that it's left alone.
>
> On Fri, Oct 7, 2
Hi all,
Thank you all for the suggestions.
The systems in question are all Debian based. A typical log stanza for a
login would be:
Sep 23 18:51:26 test sshd[25011]: Accepted publickey for root from
10.0.1.1 port 35398 ssh2
Sep 23 18:51:27 test sshd[25011]: pam_unix(sshd:session): session open
Hi,
I am taking a look at a few different servers that have been rooted at
around the same time. At the time of the compromise I can see in each
servers sshd logs an entry like the following:
Sep 22 12:57:14 test-vm sshd[25002]: pam_unix(sshd:session): session
opened for user root by (uid=0)
Sep