Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 2 Feb 1999 21:06:57 -0800 (PST)
From:      Matthew Dillon <dillon@apollo.backplane.com>
To:        "Jordan K. Hubbard" <jkh@zippy.cdrom.com>
Cc:        Garrett Wollman <wollman@khavrinen.lcs.mit.edu>, "Jonathan M. Bresler" <jmb@FreeBSD.ORG>, woodford@cc181716-a.hwrd1.md.home.com, security@FreeBSD.ORG
Subject:   Re: tcpdump 
Message-ID:  <199902030506.VAA42930@apollo.backplane.com>
References:   <10089.918017944@zippy.cdrom.com>

next in thread | previous in thread | raw e-mail | index | archive | help

:
:> It still appears to be beyond the pale of the script kiddies to
:> rewrite an Ethernet driver in order to enable it to hand off packets
:> to BPF.  Hopefully it will stay that way for a little while longer.
:
:Ummmm.  Let me just note for the record that the skill of the script
:kiddies is essentially irrelevant here since their defining attribute
:is to use scripts that others have written.  All it will take is one
:semi-intelligent cracker type to write a exploit and associated LKD
:module, then the rest will just run it blindly or whenever they've
:gained root by other means.
:
:- Jordan

   I can clear this up instantly:  I've seen the scripts to do it.

					-Matt
					Matthew Dillon 
					<dillon@backplane.com>

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199902030506.VAA42930>