Well I see that this is a low volume list so far. Maybe I can build a fire for a little while. I have been talking to Aziz Mounji of the ASAX project. He is interested in attack scenarios for ASAX. I would like to discuss this stuff in this forum. Would the list maintainers have a problem with this or should we keep attack strategies to private mail. I would anticipate providing a step by step on dinking with a target system all the way through to breaking in and getting root from some remote host. Anyone who has input could jump in anywhere along the way and add their 2 cents worth as well. Are there any strong objections to this? ---------------------------------------------------------------------------- | Rick Weldon | 'It is difficult to see a black cat in a | | E-mail: rick@badboy.clark.net | dark room, especially when it's not there' | | (Samurai for Hire | --- Chinese Saying -- | | Have Hacks-- Will Telnet) | | ----------------------------------------------------------------------------