Bugtraq mailing list archives
Re: OpenBSD Exploit
From: Brett Lymn <blymn () BAESYSTEMS COM AU>
Date: Mon, 6 Nov 2000 17:06:19 +1030
According to rloxley:
A very smart attacker will:
A smarter one will walk up to the console you assume they have physical access to and hit the DDB hot-key sequence (this is control-alt-escape for i386, other architectures are different). Note that DDB is an _option_ that is in the GENERIC kernel by default it can be disabled by reconfiguring the kernel. You can also prevent the kernel from dropping to DDB on a panic by putting options DDB_ONPANIC=0 in the kernel config and rebuilding. Well, at least you can for NetBSD - not sure about OpenBSD. -- =============================================================================== Brett Lymn, Computer Systems Administrator, BAE SYSTEMS ===============================================================================
Current thread:
- OpenBSD Exploit rloxley (Nov 06)
- Re: OpenBSD Exploit Brett Lymn (Nov 07)
- Re: OpenBSD Exploit Artur Grabowski (Nov 07)
- Re: OpenBSD Exploit Christian Ruediger Bahls (Nov 07)
- Re: OpenBSD Exploit Jose Nazario (Nov 07)
- Re: OpenBSD Exploit cripto (Nov 09)
- <Possible follow-ups>
- OpenBSD Exploit rloxley (Nov 09)