Bugtraq mailing list archives
Re: Hijacking tool
From: jim () math psu edu (Jim Duncan)
Date: Tue, 24 Jan 1995 17:34:17 -0500
Eric Conrad writes:
The measures described to prevent this (disabling loadable kernel modules) seem pointless -- if the attackers have root, they can rebuild the kernel to do anything they want.
Hacker's don't reboot -- it generates too much attention. They are much happier to use kernel-loadable modules and keep quiet. This is one reason I hated the idea of kernel-loadable modules when they were introduced. But everything has its good and bad effects. Jim
Current thread:
- Hijacking tool Christopher Klaus (May 10)
- Re: Hijacking tool Paul Ferguson (Jan 24)
- Re: Hijacking tool Casper Dik (Jan 24)
- Re: Hijacking tool Alec Muffett (Jan 24)
- Re: Hijacking tool Alan Hannan (Jan 24)
- Re: Hijacking tool bmanning () isi edu (Jan 24)
- Re: Hijacking tool Scott D. Yelich (Jan 25)
- Re: Hijacking tool Casper Dik (Jan 24)
- Re: Hijacking tool Paul Ferguson (Jan 24)
- Re: Hijacking tool Oliver Friedrichs (Jan 24)
- Re: Hijacking tool Oliver Friedrichs (Jan 24)
- Re: Hijacking tool Eric Conrad (Jan 24)
- Re: Hijacking tool Jim Duncan (Jan 24)
- Re: Hijacking tool John Evans (Jan 24)
- <Possible follow-ups>
- Re: Hijacking tool jim () Tadpole COM (Jan 23)
- Re: Hijacking tool Darren Reed (Jan 23)
- CIAC Advisory F-08: IP Address Spoofing and Hijacked Session Attacks (fwd) Mark Crother (Jan 23)
- Re: Hijacking tool Patrick Horgan (Jan 23)
- Re: Hijacking tool der Mouse (Jan 24)
- Anti Hijacking tools Pete Shipley (Jan 27)
- Re: Anti Hijacking tools jsz (Jan 28)
- Re: Anti Hijacking tools Karl Strickland (Jan 28)
- Re: Anti Hijacking tools Darren Reed (Jan 28)
- Anti Hijacking tools Pete Shipley (Jan 27)