On Fri, 30 Jul 1999, Matthew Dillon wrote:

> :     But even if you turn off the bpf device, you still have /dev/mem and
> :     /dev/kmem to worry about.  For that matter, the intruder can still write
> :     raw devices.  Also, there is another kernel feature called kldload(8).
> 
>     BTW, I wrote this section because a hacker actually installed the bpf 
>     device via the module loader during one of the root compromises at BEST,
>     a year or two ago.  He had gotten it from a hackers cookbook of exploits
>     which he convieniently left on-disk long enough for our daily backups to
>     catch it :-).

Want to post the ocde for it? It would be interesting to see how that was
done!

> 
>                                               -Matt
> 
> 
> 
> To Unsubscribe: send mail to majord...@freebsd.org
> with "unsubscribe freebsd-hackers" in the body of the message
> 

 Brian Fundakowski Feldman      _ __ ___ ____  ___ ___ ___  
 gr...@freebsd.org                   _ __ ___ | _ ) __|   \ 
     FreeBSD: The Power to Serve!        _ __ | _ \._ \ |) |
       http://www.FreeBSD.org/              _ |___/___/___/ 



To Unsubscribe: send mail to majord...@freebsd.org
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to