From owner-freebsd-security Thu Nov 30 12:13:34 2000 Delivered-To: freebsd-security@freebsd.org Received: from yez.hyperreal.org (gate.sp.collab.net [64.211.228.36]) by hub.freebsd.org (Postfix) with SMTP id 2627837B400 for ; Thu, 30 Nov 2000 12:13:30 -0800 (PST) Received: (qmail 3738 invoked by uid 1000); 30 Nov 2000 20:13:30 -0000 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 30 Nov 2000 20:13:30 -0000 Date: Thu, 30 Nov 2000 12:13:30 -0800 (PST) From: Brian Behlendorf X-Sender: brian@localhost To: David Talkington Cc: freebsd-security@FreeBSD.ORG Subject: Re: FreeBSD hacked? In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Thu, 30 Nov 2000, David Talkington wrote: > I seem to recall that these guys were the ones who hacked Slashdot > some time back. Same M.O. -- nothing destructive, left a polite > calling card, full disclosure of the penetration method. That one > wasn't a software vulnerability either; just an embarrassing > configuration problem (unmodified default password, I think!)... Someone claiming to be {} was also involved in the apache.org hack we had ~6 months ago . How they'd get in? Through a combo of a world-writeable FTP directory, with a hole in Bugzilla and a poorly configured Mysql daemon. Brian To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message