Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 11 Dec 2009 13:01:51 -0800
From:      Kurt Buff <kurt.buff@gmail.com>
To:        freebsd-questions@freebsd.org
Subject:   Re: Root exploit for FreeBSD
Message-ID:  <a9f4a3860912111301y5a8ab302kd6b535fc1689649c@mail.gmail.com>
In-Reply-To: <4297a9020912111153r1ec93838i12d1fd3aae5c61e@mail.gmail.com>
References:  <20091210144141.GB834@mech-cluster241.men.bris.ac.uk> <op.u4rt7sclqr96hw@zeta> <86tyvxlk68.fsf@ds4.des.no> <4B225077.3040009@stillbilde.net> <4297a9020912111153r1ec93838i12d1fd3aae5c61e@mail.gmail.com>

Next in thread | Previous in thread | Raw E-Mail | Index | Archive | Help
On Fri, Dec 11, 2009 at 11:53, J Sisson <sisson.j@gmail.com> wrote:
> 2009/12/11 Svein Skogen (Listmail Account) <svein-listmail@stillbilde.net>
>
>> The easiest way of brute-forcing access to a FreeBSD server includes
>> locating the sysadmin and applying the common desk drawer. It's that
>> simple.
>>
>
> http://xkcd.com/538/
>
> indeed.

Well, yes, except this assumes one has access to the sysadmin...

Kurt



Want to link to this message? Use this URL: <http://docs.FreeBSD.org/cgi/mid.cgi?a9f4a3860912111301y5a8ab302kd6b535fc1689649c>