Date: Mon, 9 Dec 1996 22:16:28 -0800 (PST) From: John-Mark Gurney <jmg@nike.efn.org> To: Brian Tao <taob@io.org> Cc: FREEBSD-SECURITY-L <freebsd-security@FreeBSD.ORG> Subject: Re: URGENT: Packet sniffer found on my system Message-ID: <Pine.NEB.3.95.961209221551.275E-100000@nike> In-Reply-To: <Pine.BSF.3.95.961210003841.1328C-100000@nap.io.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 10 Dec 1996, Brian Tao wrote: > On Tue, 10 Dec 1996, Brian Tao wrote: > > > > What it does is use bpf to log every connection between a pair of > > hosts and save all the good parts to a series of files. The guy > > running the sniffer logged well over 17000 connections today and god > > knows how many username/password combinations. He was watching the > > FTP and POP3 ports, mainly. > > Also the telnet ports to the shell servers... any tips for > cleaning up the mess? Obviously the users should be told they need to > change their passwords right away (now to think of a good way to let > everyone know... :-/). why not just have their passwords expire? then they have to change them :) hope it all works out... ttyl.. John-Mark gurney_j@efn.org http://resnet.uoregon.edu/~gurney_j/ Modem/FAX: (541) 683-6954 (FreeBSD Box) Live in Peace, destroy Micro$oft, support free software, run FreeBSD (unix)
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.95.961209221551.275E-100000>