Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 1 Dec 1999 16:00:17 -0600 (CST)
From:      Jason Hudgins <thanatos@incantations.net>
To:        Paul Hart <hart@iserver.com>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: logging a telnet session
Message-ID:  <Pine.BSF.4.10.9912011557010.20827-100000@eddie.incantations.net>
In-Reply-To: <Pine.BSF.4.21.9912011444500.51911-100000@anchovy.orem.iserver.com>

next in thread | previous in thread | raw e-mail | index | archive | help
> No.  Remember, you're the one calling the shots.  Go ahead and trojan your
> own sshd to leak session keys so you can decrypt the sniffed sessions, or
> even better, have it leak the cleartext before encrypting it.

Well, I think it would be easier to just trojanize some binaries on
the cracked box (like ps) and make the logging process invisible then to
trojan sshd AND write a decryption client of sorts.

> The original poster wanted to watch a telnet session anyway.

Yeah, I was the original poster, I'm just talking theory now. =)



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9912011557010.20827-100000>