![]() |
ex·ploit\'ek-sploit,'ik-\
1 a: to put to productive use
|
Following are a number of known exploits that take advantage of various loopholes found in various programs and front-ends. If you are a system administrator and happen to be running any versions of the programs that follow, a patch is usually provided with the documentation, and if it isn't, information can be obtained from the CERT Archives (in most cases). Believe it or not, there are still systems out there that are running un-patched and out-dated software, of which these exploits remain effective...reviewing history, it is evident that when a patch is necessary to improve the security of a system, it is put on the back-burner, due to the lack of will power or the non-chalant attitude that the system won't be attacked, and that it can wait until it is to justify an upgrade (although once is all that's needed). Either way, presented below are common exploits...absorb from them what you will. Take it easy people...
Regards, |
Sections still being compiled:
HP-UX | Ident | Invisible | NFS | WWW
|
[ G E N E R A L ]
Copyright © 1995-1997 Silicon Toad
Thou Shalt Not Copy
silicon@netwalk.com
Latest Revision: 01.Apr.1997
_________.___.____ .____________ ________ _______ / _____/| | | | \_ ___ \ \ \ \ \ \_____ \ | | | | / \ \/ | | \ / | \ / \| | |___| \ \____| | \/ | \ / _____ /|___|________|___|\________/\_________/\ __|__ / | / \/ [ T O A D ] \/ \ | |( )| (' ') |