[lug] Cracking attempts via SSH

Matt Thompson thompsma at colorado.edu
Wed Aug 25 13:25:11 MDT 2004

On Wed, 2004-08-25 at 12:17, Jeff Schroeder wrote:
> Following up on this thread from last week, I just received a link to 
> the source code for the exploit ("brutessh2") that's been attempting to 
> crack SSH systems:
> http://www.k-otik.com/exploits/08202004.brutessh2.c.php
> The code itself has a list of usernames and passwords.  Hopefully no one 
> is using something like "password" for their root account, because this 
> will crack it. ;)

Sweet, looks like my "asdfghjkl;" password is safe.  Score!
Learning just means you were wrong and they were right. - Aram
   Matt Thompson -- http://ucsub.colorado.edu/~thompsma/
   440 UCB, Boulder, CO  80309-0440
   JILA A510, 303-492-4662
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <http://lists.lug.boulder.co.us/pipermail/lug/attachments/20040825/8a919264/attachment.pgp>

More information about the LUG mailing list