Re: Attack Scenarios

Justin J. Lister (ruf@SPi)
Wed, 1 Feb 1995 17:10:10 +1100 (EST)

"Rick Weldon wrote:"

>Well I see that this is a low volume list so far. Maybe I can build a
>fire for a little while.

> I have been talking to Aziz Mounji of the ASAX project. He is
>interested in attack scenarios for ASAX. I would like to discuss this
>stuff in this forum. Would the list maintainers have a problem with this
>or should we keep attack strategies to private mail. I would anticipate
>providing a step by step on dinking with a target system all the way
>through to breaking in and getting root from some remote host. Anyone
>who has input could jump in anywhere along the way and add their 2 cents
>worth as well. 

No objection on my part (you might notice that the information sent
when joining the list *encourages* such discussions). So feel free to
bring your discussion into the list.

Still working on my 5c.

Note: 2c isn't legal tender in this country so it is worthless,
therefore a little more effort is required before providing input. B)
-- 
+---------------------+--------------------------------------------------+
|  ____       ___     | Justin Lister                 ruf@cs.uow.edu.au  |
| |    \\   /\ __\    |     Center for Computer Security Research        |
| | |) / \_/ / |_     | Dept. Computer Science      voice: 61-42-214-327 |
| |  _ \\   /| _/     | University of Wollongong      fax: 61-42-214-329 |
| |_/ \/ \_/ |_| (tm) |     Computer Security a utopian dream...         |
|                     |       Disclaimer: dreaming is at own risk        |
+---------------------+--------------------------------------------------+