Displaying 2 results from an estimated 2 matches for "metlstorm's".
2005 Sep 19
0
RUXCON 2005 Update
...9. Attack automation - Roelof Temmingh
10. Electronic Evidence - a Law Enforcement Perspective - Jason
Beckett
11. Beyond NX: An attackers guide to anti-exploitation technology for
Windows - Ben Nagy
12. Crypto Rodeo - Amy Beth Corman
13. Trust Transience: Post Intrusion SSH Hijacking - Metlstorm
14. Attacking WiFi with traffic injection - Cedric "Sid" Blanche
15. Securing Modern Web Applications - Nik Cubrilovic
16. Malware Analysis - Nicolas Brulez
17. Deaf, Dumb and Mute: Defeating Network Intrusion Detection Systems (NIDS) - Christian Heinrich
As in previous years, th...
2020 Jan 20
4
Security implications of using ControlMaster
Dear Mailing List
We are using a ControlMaster with a short ControlPersist to access the
bastion host which then gives access to customer hosts.
Our Information Security Manager would like to disallow the
ControlMaster. His attack scenario is an admin workstation with a
compromised root account. An attacker can then use the ControlMaster to
trivially get shell access on the bastion host