SSHD Vuln Exploit X2

From: Deb DeWolfe (ddewolfeat_private)
Date: Fri Feb 01 2002 - 09:22:39 PST

  • Next message: Arta: "Re: hash of an DB??"

    The exploit x2 seemd very usefull when it came out a while back after
    somebody in tesco leaked it, since then i have seen x3 and x4 clients some
    have been backdoored versions and some are actually worth using such as x4,
    the target lists vary alot i have seen targets for
    ( 2)    quick - SSH-1.5-OpenSSH-1.2
    ( 3)    quick - SSH-1.5-OpenSSH-1.2.2
    ( 4)    quick - SSH-1.5-1.2.25
    ( 5)    quick - SSH-1.5-1.2.26
    ( 6)    quick - SSH-1.5-1.2.27
    ( 7)    quick - SSH-1.5-1.2.30
    ( 8)    quick - SSH-1.5-1.2.31
    ( 9)    quick - SSH-1.99-OpenSSH_2.2.0p1
    (10)    quick - SSH-2.99-OpenSSH_2.2.0p1
    (12)    xlong - SSH-1.5-OpenSSH-1.2
    (13)    xlong - SSH-1.5-OpenSSH-1.2.2
    (14)    xlong - SSH-1.5-1.2.25
    (15)    xlong - SSH-1.5-1.2.26
    (16)    xlong - SSH-1.5-1.2.27
    (17)    xlong - SSH-1.5-1.2.30
    (18)    xlong - SSH-1.5-1.2.31
    (19)    xlong - SSH-1.99-OpenSSH_2.2.0p1
    (20)    xlong - SSH-2.99-OpenSSH_2.2.0p1
    i was wondering why has nobody written targets for some of the older sshs
    like 1.5-1.2.17 or 2.20 or 2.22 there old but should still work any ideas or
    any newer target lists such as 2.32 2.33 ?
     i have seen up to 29 i have herd there are as many as 99 im not sure though
    



    This archive was generated by hypermail 2b30 : Fri Feb 01 2002 - 09:39:51 PST