Date: Tue, 2 Feb 1999 21:06:57 -0800 (PST) From: Matthew Dillon <dillon@apollo.backplane.com> To: "Jordan K. Hubbard" <jkh@zippy.cdrom.com> Cc: Garrett Wollman <wollman@khavrinen.lcs.mit.edu>, "Jonathan M. Bresler" <jmb@FreeBSD.ORG>, woodford@cc181716-a.hwrd1.md.home.com, security@FreeBSD.ORG Subject: Re: tcpdump Message-ID: <199902030506.VAA42930@apollo.backplane.com> References: <10089.918017944@zippy.cdrom.com>
next in thread | previous in thread | raw e-mail | index | archive | help
: :> It still appears to be beyond the pale of the script kiddies to :> rewrite an Ethernet driver in order to enable it to hand off packets :> to BPF. Hopefully it will stay that way for a little while longer. : :Ummmm. Let me just note for the record that the skill of the script :kiddies is essentially irrelevant here since their defining attribute :is to use scripts that others have written. All it will take is one :semi-intelligent cracker type to write a exploit and associated LKD :module, then the rest will just run it blindly or whenever they've :gained root by other means. : :- Jordan I can clear this up instantly: I've seen the scripts to do it. -Matt Matthew Dillon <dillon@backplane.com> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199902030506.VAA42930>