Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: zenmap as root error
From: Brandon Enright <bmenrigh () ucsd edu>
Date: Fri, 11 Apr 2008 23:37:15 +0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Fri, 11 Apr 2008 13:26:06 -0300
eldraco <eldraco () gmail com> wrote:

...snip... 

Aaron, did you remember to execute 'xhost +' as a normal user before
trying zenmap as root?


Just a reminder to be _extremely_ careful with 'xhost +'.  xhost + is
second only to SSH brute force attacks as the vector to a *nix box
compromise.  It solves a lot of problems but it certainly isn't without
consequence.

Brandon

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.7 (GNU/Linux)

iD8DBQFH//Y7qaGPzAsl94IRAjSYAJ95zpLjuNoSLQKYPVdbcRs5UY8SDwCfaYsh
SCg1aDzJ6VqoEXt0KbiSwNI=
=CSHL
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault