From: Peter & <shipley@merde.dis.org>
To: eichin@cygnus.com (Mark Eichin)
Message Hash: e341cec4930a7c940fb3d9dba6a637b07b6dd5a6e1ad7c426d43adffd0c558d3
Message ID: <9303081847.AA13966@merde.dis.org>
Reply To: <9303041910.AA28103@cygnus.com>
UTC Datetime: 1993-03-08 19:59:47 UTC
Raw Date: Mon, 8 Mar 93 11:59:47 PST
From: Peter & <shipley@merde.dis.org>
Date: Mon, 8 Mar 93 11:59:47 PST
To: eichin@cygnus.com (Mark Eichin)
Subject: Re: You Aren't [I'm Not]
In-Reply-To: <9303041910.AA28103@cygnus.com>
Message-ID: <9303081847.AA13966@merde.dis.org>
MIME-Version: 1.0
Content-Type: text/x-pgp
-----BEGIN PGP SIGNED MESSAGE-----
>> i know of several slip/ppp endpoints that aren't password protected. more
>> every day, in fact.
>
> Are there any slip/ppp/uucp+rmail points that are "open" that
>aren't likely to dry up if they get widely announced? If so, please
>announce them!
I was doing some password ginding a few days ago (I do this as a favor for
a few people, and I sometimes throw passwd files from friends systems
into the "soup"). Recently I cracked a friends dialup slip password, it was
a hard choice on if I should "slip in" or not (the possiblities of the
practcal jokes was endless). If I was attampting a malicious attack or
to compromise system integrity for future attacks
-Pete
btw: if I "sliped in" I would have just run changed their Xwindow backgrounds
to say they should correct the situation (nothing malicious).
-----BEGIN PGP SIGNATURE-----
Version: 2.2
iQBFAgUBK5uUt8hmn7GUWLLFAQHNhAF+LCMvPSR04uf5ORT0oQbDfqbSF+Q4iwD8
K6796+LEdeQu1oIjWcCWITIs9jnKsJUP
=r7Ca
-----END PGP SIGNATURE-----
Return to March 1993
Return to “Theodore Ts’o <tytso@Athena.MIT.EDU>”