Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 9 Dec 1996 22:16:28 -0800 (PST)
From:      John-Mark Gurney <jmg@nike.efn.org>
To:        Brian Tao <taob@io.org>
Cc:        FREEBSD-SECURITY-L <freebsd-security@FreeBSD.ORG>
Subject:   Re: URGENT: Packet sniffer found on my system
Message-ID:  <Pine.NEB.3.95.961209221551.275E-100000@nike>
In-Reply-To: <Pine.BSF.3.95.961210003841.1328C-100000@nap.io.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 10 Dec 1996, Brian Tao wrote:

> On Tue, 10 Dec 1996, Brian Tao wrote:
> > 
> >     What it does is use bpf to log every connection between a pair of
> > hosts and save all the good parts to a series of files.  The guy
> > running the sniffer logged well over 17000 connections today and god
> > knows how many username/password combinations.  He was watching the
> > FTP and POP3 ports, mainly.
> 
>     Also the telnet ports to the shell servers... any tips for
> cleaning up the mess?  Obviously the users should be told they need to
> change their passwords right away (now to think of a good way to let
> everyone know... :-/).

why not just have their passwords expire?  then they have to change them
:)  hope it all works out...  ttyl..

John-Mark

gurney_j@efn.org
http://resnet.uoregon.edu/~gurney_j/
Modem/FAX: (541) 683-6954   (FreeBSD Box)

Live in Peace, destroy Micro$oft, support free software, run FreeBSD (unix)




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.95.961209221551.275E-100000>