PaulDotCom mailing list archives

Re: With full read access what would you read (Part 2 -Linux Answer)


From: Jim Halfpenny <jim.halfpenny () gmail com>
Date: Tue, 2 Nov 2010 20:50:05 +0000

SSH host keys would also be useful for MITM attacks.

Jim

On 2 November 2010 20:47, Baggett, Mark <mark.baggett () morris com> wrote:
ssh private keys. Those + Tavis Ormandy's priv exploits came in very handing
to me in a recent engagement.

find /home -name "id_?sa"
________________________________
From: pauldotcom-bounces () mail pauldotcom com
[mailto:pauldotcom-bounces () mail pauldotcom com] On Behalf Of Craig Freyman
Sent: Tuesday, November 02, 2010 4:16 PM
To: PaulDotCom Security Weekly Mailing List
Subject: [Pauldotcom] With full read access what would you read (Part 2
-Linux Answer)

This is the sister thread to Robin's question from earlier in the day. With
read only access to a Linux file system, other than shadow and passwd files,
what do you look for?
Thanks,
Craig
_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com


Current thread: