From owner-freebsd-hackers Mon Jul 12 13:24:26 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from alpo.whistle.com (alpo.whistle.com [207.76.204.38]) by hub.freebsd.org (Postfix) with ESMTP id 8FD9314C57 for ; Mon, 12 Jul 1999 13:24:24 -0700 (PDT) (envelope-from julian@whistle.com) Received: from current1.whistle.com (current1.whistle.com [207.76.205.22]) by alpo.whistle.com (8.9.1a/8.9.1) with SMTP id NAA32564; Mon, 12 Jul 1999 13:22:49 -0700 (PDT) Date: Mon, 12 Jul 1999 13:22:49 -0700 (PDT) From: Julian Elischer To: Karl Pielorz Cc: crypt0genic , hackers@FreeBSD.ORG Subject: Re: (forw) In-Reply-To: <3789D346.5682D28A@tdx.co.uk> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG I would suggest that a version of this document be incorporated into our docs. It's not like it says anythign new, but it's a really good introduction to KLD modules and maybe it's be better to have those documents around to remind people how easy it is to hack a system once root is broken. julian On Mon, 12 Jul 1999, Karl Pielorz wrote: > Yes, a nice, effective - and simply way of replacing syscall's on FreeBSD... > Some might say a little too 'simple'? > > -Kp > > crypt0genic wrote: > > > > Have you all seen this? > > > > From: Anonymous > > To: BUGTRAQ@SECURITYFOCUS.COM > > > > Hi folks, > > > > THC released a new article dealing with FreeBSD 3.x > > Kernel modules that can attack/backdoor the > > system. > > You can find our article on http://thc.pimmel.com or > > http://r3wt.base.org. > > > > Greets, pragmatic / The Hacker's Choice > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-hackers" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message