Date: Mon, 17 Jan 2000 14:28:07 -0500 (EST) From: Omachonu Ogali <oogali@intranova.net> To: Alexander Langer <alex@big.endian.de> Cc: Jonathan Fortin <jonf@revelex.com>, freebsd-security@FreeBSD.ORG Subject: Re: sh? Message-ID: <Pine.BSF.4.10.10001171427030.92711-100000@hydrant.intranova.net> In-Reply-To: <20000117165325.C5975@cichlids.cichlids.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On all systems. Take a look at some shellcode in the most recent exploits, they either bind /bin/sh to a port via inetd or execute some program using /bin/sh. Omachonu Ogali Intranova Networking Group On Mon, 17 Jan 2000, Alexander Langer wrote: > Thus spake Omachonu Ogali (oogali@intranova.net): > > > Most of the exploits out there use /bin/sh to launch attacks. > > On FreeBSD? > > Alex > > -- > I doubt, therefore I might be. > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.10001171427030.92711-100000>