Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 1 Dec 2005 12:39:02 -0000 (UTC)
From:      iwan@staff.usd.ac.id
To:        "Timothy Smith" <timothy@open-networks.net>
Cc:        freebsd-security@freebsd.org
Subject:   Re: exploiting kernel
Message-ID:  <63365.202.65.114.229.1133440742.squirrel@webmail.usd.ac.id>
In-Reply-To: <438E7375.5030100@open-networks.net>
References:  <52765.202.65.114.229.1133424317.squirrel@webmail.usd.ac.id> <438E7375.5030100@open-networks.net>

next in thread | previous in thread | raw e-mail | index | archive | help
I'm sorry my english makes confuse, my email mean:
I need to know about kernel's freebsd exploiting to
securing my box. And I need to know how hackers do that
(and what kind of tools they used) either.

Thanks.

> iwan@staff.usd.ac.id wrote:
>
>>Hi,
>>Can kernel's freeBSD exploited by tools hacking ? If
>> true,
>>can I know how to fix this problem, and what tools can do
>>that.
>>
>>Thanks alot
>>
>>
>>
>>_______________________________________________
>>freebsd-security@freebsd.org mailing list
>>http://lists.freebsd.org/mailman/listinfo/freebsd-security
>>To unsubscribe, send any mail to
>> "freebsd-security-unsubscribe@freebsd.org"
>>
>>
>>
>>
> thats a bit like asking how long is a piece of string.
> the port chkrootkit can help tell you if a root kit has
> been installed
> on your system, thats all i can tell you with the
> information you gave.
>






Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?63365.202.65.114.229.1133440742.squirrel>