Date: Mon, 06 May 2002 21:00:02 -0400 From: Sam Drinkard <sam@wa4phy.net> To: security@freebsd.org Subject: Woot project Message-ID: <3CD72712.37CB5750@vortex.wa4phy.net>
next in thread | raw e-mail | index | archive | help
Hello list, I just discovered I have been hacked on my main webpage from apparently the Woot project kiddies. I assume, right after the attack, I received an email from some outfit called alldas.org. My problem is this. According to what I have read about the woot project, access is gained by portscanning for the presence of SSH-1. I don't have SSH-1 or 2 active at the moment, so I'm wondering how access was gained. Have searched all the log files for unusual activity, and nothing is apparent so far. The message left at the bottom of my main page was: FreeBSD vortex.wa4phy.net 4.5-STABLE sexcii... - [sYn] of woot-project Aside from the SSH-1 vulunerabilities, is there any other known entry points associated with this cracker group? Thanks.. Sam To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3CD72712.37CB5750>