PaulDotCom mailing list archives
Re: With full read access what would you read (Part 2 -Linux Answer)
From: Jim Halfpenny <jim.halfpenny () gmail com>
Date: Tue, 2 Nov 2010 20:50:05 +0000
SSH host keys would also be useful for MITM attacks. Jim On 2 November 2010 20:47, Baggett, Mark <mark.baggett () morris com> wrote:
ssh private keys. Those + Tavis Ormandy's priv exploits came in very handing to me in a recent engagement. find /home -name "id_?sa" ________________________________ From: pauldotcom-bounces () mail pauldotcom com [mailto:pauldotcom-bounces () mail pauldotcom com] On Behalf Of Craig Freyman Sent: Tuesday, November 02, 2010 4:16 PM To: PaulDotCom Security Weekly Mailing List Subject: [Pauldotcom] With full read access what would you read (Part 2 -Linux Answer) This is the sister thread to Robin's question from earlier in the day. With read only access to a Linux file system, other than shadow and passwd files, what do you look for? Thanks, Craig _______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
Current thread:
- With full read access what would you read (Part 2 - Linux Answer) Craig Freyman (Nov 02)
- Re: With full read access what would you read (Part 2 -Linux Answer) Baggett, Mark (Nov 02)
- Re: With full read access what would you read (Part 2 -Linux Answer) Jim Halfpenny (Nov 02)
- Re: With full read access what would you read (Part 2 - Linux Answer) Mike Patterson (Nov 02)
- Re: With full read access what would you read (Part 2 - Linux Answer) Robin Wood (Nov 03)
- Re: With full read access what would you read (Part 2 -Linux Answer) Baggett, Mark (Nov 02)