Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 12 Dec 2009 17:23:04 +0100
From:      Polytropon <freebsd@edvax.de>
To:        Kurt Buff <kurt.buff@gmail.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: Root exploit for FreeBSD
Message-ID:  <20091212172304.d637d697.freebsd@edvax.de>
In-Reply-To: <a9f4a3860912111301y5a8ab302kd6b535fc1689649c@mail.gmail.com>
References:  <20091210144141.GB834@mech-cluster241.men.bris.ac.uk> <op.u4rt7sclqr96hw@zeta> <86tyvxlk68.fsf@ds4.des.no> <4B225077.3040009@stillbilde.net> <4297a9020912111153r1ec93838i12d1fd3aae5c61e@mail.gmail.com> <a9f4a3860912111301y5a8ab302kd6b535fc1689649c@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 11 Dec 2009 13:01:51 -0800, Kurt Buff <kurt.buff@gmail.com> wrote:
> Well, yes, except this assumes one has access to the sysadmin...

Physical access.

It's hard to exploit a sysadmin by social engineering
because he hardly has any friends. :-)




-- 
Polytropon
Magdeburg, Germany
Happy FreeBSD user since 4.0
Andra moi ennepe, Mousa, ...



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20091212172304.d637d697.freebsd>