Hello Andrew,
I shall completely ignore the e-mails that followed your reply, as they
seem to me completly out of the subject and and the same time some of
which offensive to me!
Let's go into more detauls on that backdoor.
I created the file test1.sh containing:
[EMAIL PROTECTED]:~/hacki$ cat
Hello Rik,
and how on earth can you make root run that piece of code? Do you have
to specify it in the README section that it is mandatory to run that as
root in order the new application root will be installing to run as
expected?
Indeed, it is hard to tell what it actually does... unless you
J. Oquendo,
Sorry for my ever asking for clarification on plague.
Keep the good work.
Maybe I will be unsubscribed by the time you read those lines, who knows?
cheers,
-nik
[EMAIL PROTECTED] wrote:
Hello Rik,
and how on earth can you make root run that piece of code? Do you have
to
cheers man,
i'd do the same;-)
-nik
You always get these i'm l33t and like to insult people kind of goons on
unmoderated lists.
They're good for a laugh, but usually I just ignore them or if they are
particularly odious I filter them to trash. There's still good
information
to be found
even if they have ssh access, there is still nothing they can do, except
to create two files in there $HOME directories containing expressions from
paths.h and sysexits.h ?
Why would that be considered a backdoor?
Regards,
-Nikolay Kichukov
On 10/22/06, J. Oquendo [EMAIL PROTECTED] wrote: