sniffer/promisc detector

Brett Watson brett at the-watsons.org
Tue Jan 20 06:26:30 UTC 2004


>> i wish you were right.  i wish you were even close to right.  but we've
> been
>> attacked many times over the years by some extremely smart adolescent
>> psychopaths -- where adolescence is a state of mind in this case, rather
>> than of years -- and i wish very much that they would either stop being
>> so smart, or stop being so psychotic, or stop being so adolescent.
> 
> Hmm.
> 
> It depends of, what is _attack_. For example, if I have old, unpatched sshd
> daemon (which is easy to hack), but
> run it at port 30022, how long do I need to expose it on Internet to be
> hacked? (Answer - you will never be hacked, if
> you use nonstandard port, except if you attracks someone by name, such as
> _SSH-DAEMOn.Rich-Bank-Of-America.Com_.

Uhm, that would be wrong.  This is simply "security through obscurity".

Go grab nessus (www.nessus.org), modify the code a bit, and I guarantee you
that your ssh daemon running on a non-standard port can still be found,
identified, and exploited. Trivial.

-b




More information about the NANOG mailing list