[lug] Cracking attempts via SSH
Matt Thompson
thompsma at colorado.edu
Wed Aug 25 13:25:11 MDT 2004
On Wed, 2004-08-25 at 12:17, Jeff Schroeder wrote:
> Following up on this thread from last week, I just received a link to
> the source code for the exploit ("brutessh2") that's been attempting to
> crack SSH systems:
>
> http://www.k-otik.com/exploits/08202004.brutessh2.c.php
>
> The code itself has a list of usernames and passwords. Hopefully no one
> is using something like "password" for their root account, because this
> will crack it. ;)
Sweet, looks like my "asdfghjkl;" password is safe. Score!
--
Learning just means you were wrong and they were right. - Aram
Matt Thompson -- http://ucsub.colorado.edu/~thompsma/
440 UCB, Boulder, CO 80309-0440
JILA A510, 303-492-4662
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <http://lists.lug.boulder.co.us/pipermail/lug/attachments/20040825/8a919264/attachment.pgp>
More information about the LUG
mailing list