home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!cis.ohio-state.edu!zaphod.mps.ohio-state.edu!saimiri.primate.wisc.edu!usenet.coe.montana.edu!ogicse!flop.ENGR.ORST.EDU!gaia.ucs.orst.edu!skyking!stanley
- From: stanley@skyking.OCE.ORST.EDU (John Stanley)
- Newsgroups: comp.security.misc
- Subject: Re: Two hackers caught tapping into Boeing, federal computers
- Message-ID: <1es54eINNg00@talon.UCS.ORST.EDU>
- Date: 24 Nov 92 02:47:42 GMT
- Article-I.D.: talon.1es54eINNg00
- Organization: Oregon State University, College of Oceanography
- Lines: 22
- NNTP-Posting-Host: skyking.oce.orst.edu
-
- In article <1992Nov23.204917.19519@jato.jpl.nasa.gov> dave@jato.jpl.nasa.gov writes:
- >stanley@skyking.OCE.ORST.EDU (John Stanley) writes:
- >>>>filed with the charges stated. ``He then transferred the password file
- >>>>to a Boeing Company computer, where he decrypted the passwords.''
- >>>> That process gave Anderson the ``root'' password, which allowed
- >>If decrypting the passwords gave him the root password, then yes, Dave,
- >>they cracked the root password.
- >
- >"That process gave Anderson the root password". That could also mean
- >that by getting a random account on the machine they _acquired_ root
- >access, and then changed the password.
-
- Allright Dave. Whatever you say. Even though the process as described
- didn't include logging back into the broken system and entering another
- security hole to get root access, that must be what the article wanted
- to say.
-
- Even though the antecedent to the "That process" is only in the two
- lines immediately prior to it, there must be another "that process"
- that is being referred to.
-
- Whatever you want, Dave. Have a nice day. Goodbye.
-