Attack Scenarios

Rick Weldon (rick@badboy.clark.net)
Tue, 31 Jan 1995 22:12:23 -0500 (WET)

Well I see that this is a low volume list so far. Maybe I can build a
fire for a little while.

 I have been talking to Aziz Mounji of the ASAX project. He is
interested in attack scenarios for ASAX. I would like to discuss this
stuff in this forum. Would the list maintainers have a problem with this
or should we keep attack strategies to private mail. I would anticipate
providing a step by step on dinking with a target system all the way
through to breaking in and getting root from some remote host. Anyone
who has input could jump in anywhere along the way and add their 2 cents
worth as well. 

Are there any strong objections to this?

 ----------------------------------------------------------------------------
| Rick Weldon                   | 'It is difficult to see a black cat in a   |
| E-mail: rick@badboy.clark.net | dark room, especially when it's not there' |
| (Samurai for Hire             |                    --- Chinese Saying --   |
| Have Hacks-- Will Telnet)     |					     |
 ----------------------------------------------------------------------------