Home page logo
/

pen-test logo Penetration Testing mailing list archives

OpenSSH exploit
From: Rafael San Miguel <smcsoc () yahoo es>
Date: Tue, 27 Sep 2005 09:30:45 +0200 (CEST)


Hi there,

I am trying to exploit a vulnerable version of OpenSSH
(3.1p1) through challenge-response buffer overflow
(BID 5093). I have already checked it meets the
pre-requisites (keyboard-interactive is enabled).
I have compiled the modified version of the client as
explained in
http://downloads.securityfocus.com/vulnerabilities/exploits/openssh3.1obsdexp.txt.
But when it comes to run it (./ssh
root:skey () [SERVER]), the exploit doesn't work: it asks
for the password, as with the original version of ssh.
The target platform is Red Hat Linux. 

Has anyone sucessfully exploited this overflow in
Linux?

Thanks in advance. Greetings,

RSMC

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]