Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 17 Jan 2000 14:28:07 -0500 (EST)
From:      Omachonu Ogali <oogali@intranova.net>
To:        Alexander Langer <alex@big.endian.de>
Cc:        Jonathan Fortin <jonf@revelex.com>, freebsd-security@FreeBSD.ORG
Subject:   Re: sh?
Message-ID:  <Pine.BSF.4.10.10001171427030.92711-100000@hydrant.intranova.net>
In-Reply-To: <20000117165325.C5975@cichlids.cichlids.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On all systems.

Take a look at some shellcode in the most recent exploits, they either
bind /bin/sh to a port via inetd or execute some program using /bin/sh.

Omachonu Ogali
Intranova Networking Group

On Mon, 17 Jan 2000, Alexander Langer wrote:

> Thus spake Omachonu Ogali (oogali@intranova.net):
> 
> > Most of the exploits out there use /bin/sh to launch attacks.
> 
> On FreeBSD?
> 
> Alex
> 
> -- 
> I doubt, therefore I might be. 
> 



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.10001171427030.92711-100000>