Date: Mon, 6 May 2002 22:24:37 -0700 From: "Crist J. Clark" <cjc@FreeBSD.ORG> To: Sam Drinkard <sam@wa4phy.net> Cc: security@FreeBSD.ORG Subject: Re: Woot project Message-ID: <20020506222437.F89339@blossom.cjclark.org> In-Reply-To: <3CD72712.37CB5750@vortex.wa4phy.net>; from sam@wa4phy.net on Mon, May 06, 2002 at 09:00:02PM -0400 References: <3CD72712.37CB5750@vortex.wa4phy.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, May 06, 2002 at 09:00:02PM -0400, Sam Drinkard wrote:
> Hello list,
>
> I just discovered I have been hacked on my main webpage from
> apparently the Woot project kiddies. I assume, right after the attack,
> I received an email from some outfit called alldas.org. My problem is
> this. According to what I have read about the woot project, access is
> gained by portscanning for the presence of SSH-1. I don't have SSH-1 or
> 2 active at the moment, so I'm wondering how access was gained. Have
> searched all the log files for unusual activity, and nothing is apparent
> so far. The message left at the bottom of my main page was:
>
> FreeBSD vortex.wa4phy.net 4.5-STABLE sexcii... - [sYn] of woot-project
>
> Aside from the SSH-1 vulunerabilities, is there any other known
> entry points associated with this cracker group?
CGI bugs.
--
Crist J. Clark | cjclark@alum.mit.edu
| cjclark@jhu.edu
http://people.freebsd.org/~cjc/ | cjc@freebsd.org
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020506222437.F89339>
