Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 6 May 2002 22:24:37 -0700
From:      "Crist J. Clark" <cjc@FreeBSD.ORG>
To:        Sam Drinkard <sam@wa4phy.net>
Cc:        security@FreeBSD.ORG
Subject:   Re: Woot project
Message-ID:  <20020506222437.F89339@blossom.cjclark.org>
In-Reply-To: <3CD72712.37CB5750@vortex.wa4phy.net>; from sam@wa4phy.net on Mon, May 06, 2002 at 09:00:02PM -0400
References:  <3CD72712.37CB5750@vortex.wa4phy.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, May 06, 2002 at 09:00:02PM -0400, Sam Drinkard wrote:
> Hello list,
> 
>     I just discovered I have been hacked on my main webpage from
> apparently the Woot project kiddies.  I assume, right after the attack,
> I received an email from some outfit called alldas.org.  My problem is
> this.  According to what I have read about the woot project, access is
> gained by portscanning for the presence of SSH-1.  I don't have SSH-1 or
> 2 active at the moment, so I'm wondering how access was gained.  Have
> searched all the log files for unusual activity, and nothing is apparent
> so far.  The message left at the bottom of my main page was:
> 
> FreeBSD vortex.wa4phy.net 4.5-STABLE sexcii... - [sYn] of woot-project
> 
>     Aside from the SSH-1 vulunerabilities, is there any other known
> entry points associated with this cracker group?

CGI bugs.
-- 
Crist J. Clark                     |     cjclark@alum.mit.edu
                                   |     cjclark@jhu.edu
http://people.freebsd.org/~cjc/    |     cjc@freebsd.org

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020506222437.F89339>