Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 06 May 2002 21:00:02 -0400
From:      Sam Drinkard <sam@wa4phy.net>
To:        security@freebsd.org
Subject:   Woot project
Message-ID:  <3CD72712.37CB5750@vortex.wa4phy.net>

next in thread | raw e-mail | index | archive | help
Hello list,

    I just discovered I have been hacked on my main webpage from
apparently the Woot project kiddies.  I assume, right after the attack,
I received an email from some outfit called alldas.org.  My problem is
this.  According to what I have read about the woot project, access is
gained by portscanning for the presence of SSH-1.  I don't have SSH-1 or
2 active at the moment, so I'm wondering how access was gained.  Have
searched all the log files for unusual activity, and nothing is apparent
so far.  The message left at the bottom of my main page was:

FreeBSD vortex.wa4phy.net 4.5-STABLE sexcii... - [sYn] of woot-project

    Aside from the SSH-1 vulunerabilities, is there any other known
entry points associated with this cracker group?

Thanks..

Sam


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3CD72712.37CB5750>