search for: backdoor

Displaying 20 results from an estimated 171 matches for "backdoor".

Did you mean: backdoors
2015 Apr 16
3
ClamAV reports a trojan
This morning I discovered this in my clamav report from one of our imap servers: /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: Unix.Trojan.MSShellcode-21 FOUND I have looked at this script and it appears to be part of the nmap distribution. It actually tests for irc backdoors. IRC is not used here and its ports are blocked by default both at the gateway and on all internal hosts. However, I none-the-less copied t...
2010 Dec 15
5
Allegations regarding OpenBSD IPSEC
Some of you probably already read this: http://marc.info/?l=openbsd-tech&m=129236621626462&w=2 Interesting...I wonder what is the impact of all this on FreeBSD code. We may very well suppose that any government or corporation funded code can theoretically have some kind of backdoor inside. --Andy
2011 May 09
2
backdoor by authorized_keys2 leftovers
Hi devs, recently I had to replace authorized_keys on several systems to enforce an access policy change. I was badly surprised that authorized_keys2(!) was still processed, which allowed some old keys to enter the systems again, because I wasn't aware of the file's existance on the server and use by sshd, since this "backward compatibility" isn't documented, not even a
2015 May 26
2
Weak DH primes and openssh
On Tue 2015-05-26 12:57:05 -0400, Hubert Kario wrote: > creating composites that will pass even 100000 rounds of Miller-Rabin is > relatively simple.... > (assuming the values for M-R tests are picked randomly) Can you point me to the algorithms for doing that? This would suggest that we really do want primality proofs (and a good way to verify them). Do those algorithms hold for
1998 May 23
7
Re: Re: Re: Bind Overrun Bug and Linux (fwd)
...y were named in the rootkit. There are many set of trojanned source code trees out there, but the most prevailent seems to be Linux RootKit (LRK). This kit included lots of trojanned binary source, but is sloppily written. This is all LRK actually contains, from it''s readme: chfn: local backdoor chsh: local backdoor inetd: remote backdoor login: remote backdoor ls/du: hide files ifconfig: hide sniffing netstat: hide connections ps/top: hide processes passwd: localhost backdoor rshd: remote backdoor syslogd: hide log strings tcpd: avoid denials It also includes linsniff, and a few other log...
2018 May 27
2
Strange crypto choices
On Mon, 28 May 2018, Yegor Ievlev wrote: > Can we prefer RSA to ECDSA? For example: > HostKeyAlgorithms > ssh-rsa,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256 not without a good reason
2011 Jun 23
3
dovecot security with IPv6
Hi Timo, hi all others! In fact, I've only read one person claiming that IPv6 support opens up "too many backdoors" [1], but anyway, as I intend to run just particular services, please give me your opinion if it's insecure to have a dovecot server, which is accessed through a public IPv6 address... (or note just shortly what else could give a firm ground to such claims...) [1] http://forums.gentoo.or...
2017 Apr 15
5
OT: systemd Poll - So Long, and Thanks for All the fish.
Not wishing to extend this thread further, but ... > There are conspiracy theories out there that the NSA is involved with > bringing systemd to Linux so they can have easy access to *"unknown"* > bugs - aka backdoors - to all Linux installations using systemd *[1]*. They're conspiracy theories, and that's it. The bottom line is that in general people don't like not understanding things and when they come across something they don't understand they create a mythology around those things to rat...
2015 Apr 16
0
ClamAV reports a trojan
On Thu, Apr 16, 2015 at 10:01 AM, James B. Byrne <byrnejb at harte-lyne.ca> wrote: > This morning I discovered this in my clamav report from one of our > imap servers: > > /usr/share/nmap/scripts/irc-unrealircd-backdoor.nse: > Unix.Trojan.MSShellcode-21 FOUND > > > I have looked at this script and it appears to be part of the nmap > distribution. It actually tests for irc backdoors. IRC is not used > here and its ports are blocked by default both at the gateway and on > all internal hosts. &...
2007 Nov 24
1
Project proposal/idea: Categorize traffic by behavior
...rized by large packets being back-to-back. I propose this could be implemented with Netfilter target modules for categorizing traffic, and using conntrack flows for saving the group/type, that other rules can match upon. What can it be used for? ------------------------ Security/NIDS: Detecting backdoors, by identifying interactive on non-standard ports. QoS: Prioritize traffic based on type (e.g. interactive or RTP-streams) without needing to write static iptables rules to match each new protocols port number. Some protocols, like Skype, its not possible to do categorizing based upon standa...
2015 May 26
8
Weak DH primes and openssh
...e no evidence that an algorithm for generating a(n) where n is arbitrarily large exists. Does such a thing exist? > yes, using ECPP and distributing proof with the prime (or just placing it on > the project website) is a reasonable minimum, that still leaves out the > possibility of a backdoor if the initial seed value is random it sounds like we're heading into the same territory as the ECDH curve selection discussion -- the theory you're suggesting is that some safe-prime moduli could themselves have a backdoor that we don't know about. Am i understanding you correctly?...
2006 May 04
2
Uselib24/bindz - owned!
...c.txt -rwxrwxr-x 1 apache apache 479843 Aug 3 2005 uselib24 dc.txt started: #!/usr/bin/perl use IO::Socket; #IRAN HACKERS SABOTAGE Connect Back Shell #code by:LorD #We Are :LorD-C0d3r-NT #Email:LorD at ihsteam.com # #lord at SlackwareLinux:/home/programing$ perl dc.pl #--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==-- # #Usage: dc.pl [Host] [Port] # #Ex: dc.pl 127.0.0.1 2121 #lord at SlackwareLinux:/home/programing$ perl dc.pl 127.0.0.1 2121 #--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==-- # #[*] Resolving HostName #[*] Connecting....
2016 Jan 14
2
Fwd: Heads up: OpenSSH users
...e configuration file, and there's no mention of it at all in the > configuration file, not even the default? > > That is more than slightly unacceptable. > More than agree! I was highly respecting OpenBSD project, especially for their openssh. After scandal with OpenBSD IPSEC stack backdoor accusations, my respect faded grossly, and I felt extremely happy my choice of system for servers fell on FreeBSD, not OpenBSD (for some independent reason)... Valeri ++++++++++++++++++++++++++++++++++++++++ Valeri Galtsev Sr System Administrator Department of Astronomy and Astrophysics Kavli Ins...
2005 Feb 14
3
Hackers on my Web server
I have discovered that a gamer has hacked into my web server through a backdoor left open by my predecessor. I have closed the door, but when I try to delete the folders left behind I receive "Access Denied", or when I try to take ownership I receive "Unable to Find File...". I have removed most of the files to obtain enough space to continue operations but...
2003 Apr 23
2
Call Queue Manager and DID Digits
...mething like this working? Is it possible to have some lines go to the auto-attendent and some ring through? I was thinking it would be possible with something as simple as (assuming 4-digit DID) [default] ; 555-1212 is the main number exten => 1212,1,Goto(AutoAttendant,s,1) ; 555-5000 is the backdoor to the voicemail system exten => 5000,1,VoiceMailMain() exten => 5000,1,Hangup() ; 555-1800 is Bob's phone exten => 1800,1,Dial(Zap/842) ... Is that in line or am I missing something? Does anyone have that working? The service is expensive, so I'd rather not have to pay to find...
1998 May 19
7
Bind Overrun Bug and Linux
[mod: Just to show you that people DO get bitten after a bugwarning has gone out on linux-security..... -- REW] -----BEGIN PGP SIGNED MESSAGE----- Content-Type: text/plain; charset=us-ascii Has anyone been hit with the Bind Inverse Query Buffer Overrun on their Linux servers? We have had 3 servers attacked using this expoit and all of the machines had several binaries replaced with trojan
2004 Sep 10
3
Should FLAC join Xiph?
...he chances that someone will use the BSD license to make > proprietary changes to FLAC. Weigh that against the chances that FLAC Well, I think going GPL would be too much, only GPL softwares could use the library. BSD is too much too because changes in the software world (improvements, bugs, backdoors) would not be available to you. Only the hardware world is a problem. And usually when they support a format they're ready to pay for the development and even the port ot their architecture. I use a lot the SciTE editor which is BSD-like. Neil Hodgson is working full time on it because so...
2018 May 28
2
Strange crypto choices
We're aware of those arguments but don't find them convincing enough to switch early. On Mon, 28 May 2018, Yegor Ievlev wrote: > A backdoored curve could be easily generated using the algorithm used > to generate the NIST curves. > https://bada55.cr.yp.to/vr.html > > The algorithm that generates a backdoored curve is very simple: > Suppose the NSA (the author of the curves) knows a way to solve ECDLP > in polynominal...
2018 Apr 18
0
Robust Cluster
...unning XP under Windows 7, And Windows 7 doesn't pool. Now, Linux pools. All Unix has always pooled, more or less. Right from the start. I want to build something robust. I've experimented with DDNS on NoIP. I'm getting the paid service. Combined with enom and replikon.net, I can have backdoors and VPNs to every system. These backdoors would be a fallback. The Ethernet would be the front door. PXELINUX would boot from a flash card in a Linksys 150N router, or two, Using WiFi or Ethernet. Well, that's the proposal. I think it would be robust. Capiche? Doug -- Cheers! Douglas G...
2010 Dec 15
1
IPSEC allegations
[redirected from -hackers to -security] Jakub Lach <jakub_lach@mailplus.pl> writes: > http://marc.info/?l=openbsd-tech&m=129236621626462&w=2 http://maycontaintracesofbolts.blogspot.com/2010/12/openbsd-ipsec-backdoor-allegations.html DES -- Dag-Erling Sm?rgrav - des@des.no