[olug] users.olug.org

Jonathan Warren thechunk at cox.net
Wed Mar 12 20:13:51 UTC 2003


Well yes please give them my contact information.

402-991-1475
402-271-7103

Jon Warren
1301 Offutt blvd 
Bellevue, NE 68005

If I am running the risk of "ruining" the shell accounts for all please just terminate my account because I don't want that label.  

-Jon

On Wed, Mar 12, 2003 at 01:46:19PM -0600, Brian Roberson wrote:
> So, when I get a call from people at news.com about possible devious
> activity, shall I give them you home #?
> 
> users:/home/thechunk # grep news.com .bash_history
> lynx www.news.com
> ping www.news.com
> telnet www.news.com 21
> nmap www.news.com
> users:/home/thechunk #
> 
> 
> I have be super leanient till now on the shell services, please dont ruin it
> for all.
> 
> 
> 
> 
> 
> ----- Original Message -----
> From: "Jonathan Warren" <thechunk at cox.net>
> To: <waltern at iivip.com>; "Omaha Linux User Group" <olug at olug.org>
> Sent: Wednesday, March 12, 2003 9:17 AM
> Subject: Re: [olug] users.olug.org
> 
> 
> > Yes I understand all this.  I am not condonign illegal access to anything.
> However this reminds me of a story I've heard.  It goes somethign like this.
> It came to the attention of some higher up military types that there were
> open and available tools to allow for testing the security of a machine.
> There reaction was to try and classify it.  They thought they could hide it
> and continue running insecure boxes.  I just don't see the point in running
> from something that is very useful.  Again I am not condoning illegal
> access.  The information provided by nmap is very useful.  Why the fear of
> it?  Why not leverage it to improve security across the whole network?
> Anyway just my .02.
> >
> > Again I am not out to get anyone upset with me and won't use it again from
> that machine if it bothers people.  I just don't understand the fear.
> >
> > -Jon W
> >
> > On Wed, Mar 12, 2003 at 09:03:02AM -0600, Nick Walter wrote:
> > > If I wanted to hypothetically start a mad reign of hacking terror, my
> > > steps would be along the lines of
> > >
> > > 1.)  Using a sniffer or guessing or social engineering, get the password
> > > to someones shell account (for this example, we'll assume Jonathan
> > > Warren's OLUG shell account).
> > >
> > > 2.)  Use it to start scanning for vulnerabilities on other servers.  I
> > > would probably use nmap for this.
> > >
> > > 3.)  Use publically available exploits to then exploit and root the
> > > servers.
> > >
> > > 4.)  Do amusing things to the rooted servers.  This includes defacing
> > > websites, installing sniffers, or the ever popular rm -rf /*
> > >
> > > 5.)  Eventually get noticed, and all the activity is traced back to . .
> > > . Jonathan Warren!
> > >
> > > I'm not picking on Jonathan btw, just illustrating an all-too-likely
> > > scenario that is the reason why there are rules against port scanning
> > > and so forth with shell accounts.
> > >
> > > Nick Walter
> > >
> > > On Wed, 2003-03-12 at 08:59, Jonathan Warren wrote:
> > > > Really?  Ok I won't do it anymore.  I guess I don't understand why it
> would be illegal.  If you could explain I would appreciate it.
> > > >
> > > > On Tue, Mar 11, 2003 at 11:43:16PM -0600, Brian Roberson wrote:
> > > > > Well..........
> > > > >
> > > > >
> > > > >     All I can say is...... It is for OLUG staff to know and you to
> wonder...
> > > > > I should deactivate you account for misconduct, but I will simply
> give you a
> > > > > public hand slap. port scanning and other "can be perceived as
> devious"
> > > > > activity is not allowed on the olug shell server. Please do not make
> me push
> > > > > the issue any further than this email, port scanning ( even if is
> your own
> > > > > machine ) will not be tolerated.
> > > > >
> > > > >
> > > > >
> > > > >
> > > > >
> > > > >
> > > > > ----- Original Message -----
> > > > > From: "Jonathan Warren" <thechunk at cox.net>
> > > > > To: <olug at olug.org>
> > > > > Sent: Tuesday, March 11, 2003 9:33 PM
> > > > > Subject: Re: [olug] users.olug.org
> > > > >
> > > > >
> > > > > > No I don't.  I scanned it from the my work and nothing showed up.
> I can
> > > > > even scan itself and it can't find anything.  I have done lsof and
> netstats
> > > > > to no avail.  If I scan news.com or yahoo.com it says 21 is open
> there too.
> > > > > I find it hard to beleive that they would be running telnet servers.
> The
> > > > > next hope in a netstat is some kind of a firewall box.  I am curious
> if it
> > > > > is intercepting my port 21 requests and dropping them or something.
> Anyway
> > > > > just curious.  If you want to check me for an ftp port my address is
> > > > > thechunk.dyn.dhs.org.
> > > > > >
> > > > > >
> > > > > > On Tue, Mar 11, 2003 at 06:10:20PM -0600, ktb wrote:
> > > > > > > On Tue, Mar 11, 2003 at 05:19:09PM -0600, Jonathan Warren wrote:
> > > > > > > > I was tryign to find what my open ports I had on my box.  I
> downloaded
> > > > > nmap to users.olug.org and built it and installed it into my home
> directory.
> > > > > Everything I scan with it reports that port 21 is open.  Any idea
> why it
> > > > > would say that?  It seems very strange to me.
> > > > > > >
> > > > > > > What is "everything you scan?"  21/tcp is generally used for
> ftp.  You
> > > > > > > can grep though /etc/services to find that information.  Sounds
> like you
> > > > > > > have an ftp server running on your system.
> > > > > > > hth,
> > > > > > > kent
> > > > > > >
> > > > > > > --
> > > > > > > To know the truth is to distort the Universe.
> > > > > > >                       Alfred N. Whitehead (adaptation)
> > > > > > > _______________________________________________
> > > > > > > OLUG mailing list
> > > > > > > OLUG at olug.org
> > > > > > > http://lists.olug.org/mailman/listinfo/olug
> > > > > > _______________________________________________
> > > > > > OLUG mailing list
> > > > > > OLUG at olug.org
> > > > > > http://lists.olug.org/mailman/listinfo/olug
> > > > > >
> > > > >
> > > > > _______________________________________________
> > > > > OLUG mailing list
> > > > > OLUG at olug.org
> > > > > http://lists.olug.org/mailman/listinfo/olug
> > > > _______________________________________________
> > > > OLUG mailing list
> > > > OLUG at olug.org
> > > > http://lists.olug.org/mailman/listinfo/olug
> > > >
> > >
> > > _______________________________________________
> > > OLUG mailing list
> > > OLUG at olug.org
> > > http://lists.olug.org/mailman/listinfo/olug
> > _______________________________________________
> > OLUG mailing list
> > OLUG at olug.org
> > http://lists.olug.org/mailman/listinfo/olug
> >
> 
> _______________________________________________
> OLUG mailing list
> OLUG at olug.org
> http://lists.olug.org/mailman/listinfo/olug


More information about the OLUG mailing list