Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: H C (keydet89yahoo.com)
Date: Thu May 02 2002 - 18:02:43 CDT
Thanks for the response.
> Let me start by saying this the meaning of "rooting"
> a box figurativly comes
> from the Unix world but can be applied to any OS..
> Back to the subject yes
> their are tons of NT?2K (Microsoft) boxes hacked and
> rooted every day. Try this
> site to see some web hacks on 2k and NT:
> http://www.zone-h.org/ . The idea of
> exploiting a box via misconfigured OS, software or
> poorly set security
> configurations happens everyday.
While I agree that web page defacements happen all the
time (alldas.org), a web page defacement is not
necessarily a 'rooting', is it? In fact, many
defacings on systems running IIS occur w/o the
attacker every gaining shell access to the system.
Therefore, simple web page defacements don't even
approach the context of this thread, unless the
defacement occurred as a result of someone gaining
access, installing a backdoor, and then changing the
page(s) via that backdoor.
> There are rootkits trojans and tools written
> specifically for Microsoft OSes.
I am familiar with many MS-specific trojans and tools,
but only 1 rootkit, that being the one written by Greg
Hoglund. You use the plural...can you name, link to,
or give any other information on any rootkits (those
that allow the attacker to hide processes, etc) other
than Hoglunds? I'd be very interested in seeing what
Do You Yahoo!?
Yahoo! Health - your guide to health and wellness