1993-03-08 - Re: You Aren’t [I’m Not]

Header Data

From: Peter & <shipley@merde.dis.org>
To: eichin@cygnus.com (Mark Eichin)
Message Hash: e341cec4930a7c940fb3d9dba6a637b07b6dd5a6e1ad7c426d43adffd0c558d3
Message ID: <9303081847.AA13966@merde.dis.org>
Reply To: <9303041910.AA28103@cygnus.com>
UTC Datetime: 1993-03-08 19:59:47 UTC
Raw Date: Mon, 8 Mar 93 11:59:47 PST

Raw message

From: Peter & <shipley@merde.dis.org>
Date: Mon, 8 Mar 93 11:59:47 PST
To: eichin@cygnus.com (Mark Eichin)
Subject: Re: You Aren't [I'm Not]
In-Reply-To: <9303041910.AA28103@cygnus.com>
Message-ID: <9303081847.AA13966@merde.dis.org>
MIME-Version: 1.0
Content-Type: text/x-pgp



-----BEGIN PGP SIGNED MESSAGE-----


>>   i know of several slip/ppp endpoints that aren't password protected.  more
>>   every day, in fact.
>
>       Are there any slip/ppp/uucp+rmail points that are "open" that
>aren't likely to dry up if they get widely announced? If so, please
>announce them!


I was doing some password ginding a few days ago (I do this as a favor for
a few people, and I sometimes  throw passwd files from friends systems
into the "soup").  Recently I cracked a friends dialup slip password, it was
a hard choice on if I should "slip in" or not (the possiblities of the
practcal jokes was endless).  If I was attampting a malicious attack or
to compromise system integrity for future attacks


                        -Pete

btw: if I "sliped in" I would have just run changed their Xwindow backgrounds
    to say they should correct the situation (nothing malicious).



-----BEGIN PGP SIGNATURE-----
Version: 2.2

iQBFAgUBK5uUt8hmn7GUWLLFAQHNhAF+LCMvPSR04uf5ORT0oQbDfqbSF+Q4iwD8
K6796+LEdeQu1oIjWcCWITIs9jnKsJUP
=r7Ca
-----END PGP SIGNATURE-----





Thread