Date: Wed, 1 Dec 1999 16:00:17 -0600 (CST) From: Jason Hudgins <thanatos@incantations.net> To: Paul Hart <hart@iserver.com> Cc: freebsd-security@FreeBSD.ORG Subject: Re: logging a telnet session Message-ID: <Pine.BSF.4.10.9912011557010.20827-100000@eddie.incantations.net> In-Reply-To: <Pine.BSF.4.21.9912011444500.51911-100000@anchovy.orem.iserver.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> No. Remember, you're the one calling the shots. Go ahead and trojan your > own sshd to leak session keys so you can decrypt the sniffed sessions, or > even better, have it leak the cleartext before encrypting it. Well, I think it would be easier to just trojanize some binaries on the cracked box (like ps) and make the logging process invisible then to trojan sshd AND write a decryption client of sorts. > The original poster wanted to watch a telnet session anyway. Yeah, I was the original poster, I'm just talking theory now. =) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9912011557010.20827-100000>