"Rick Weldon wrote:" >Well I see that this is a low volume list so far. Maybe I can build a >fire for a little while. > I have been talking to Aziz Mounji of the ASAX project. He is >interested in attack scenarios for ASAX. I would like to discuss this >stuff in this forum. Would the list maintainers have a problem with this >or should we keep attack strategies to private mail. I would anticipate >providing a step by step on dinking with a target system all the way >through to breaking in and getting root from some remote host. Anyone >who has input could jump in anywhere along the way and add their 2 cents >worth as well. No objection on my part (you might notice that the information sent when joining the list *encourages* such discussions). So feel free to bring your discussion into the list. Still working on my 5c. Note: 2c isn't legal tender in this country so it is worthless, therefore a little more effort is required before providing input. B) -- +---------------------+--------------------------------------------------+ | ____ ___ | Justin Lister ruf@cs.uow.edu.au | | | \\ /\ __\ | Center for Computer Security Research | | | |) / \_/ / |_ | Dept. Computer Science voice: 61-42-214-327 | | | _ \\ /| _/ | University of Wollongong fax: 61-42-214-329 | | |_/ \/ \_/ |_| (tm) | Computer Security a utopian dream... | | | Disclaimer: dreaming is at own risk | +---------------------+--------------------------------------------------+