Arioch Posted July 24, 2001 I just noticed this morning that notgod.com, the server that hosts the ZDoom pages, appears to have been defaced. I'm going to assume that somebody has taken advantage of the recently discovered telnetd exploit in *nix/BSD systems. So here's a word of warning to you all aspiring *nix system administrators ... for pete's sake don't run telnet/telnetd! An alternative to telnet is OpenSSH, which establishes encrypted connections. 0 Share this post Link to post
Guest SlayeR Posted July 24, 2001 Well, it has happened before. A while ago I tried to get there at this time of day and it had that same lucubration page... 0 Share this post Link to post
Guest Fanatic Posted July 24, 2001 My god, an exploit that doesn't have the word "Microsoft" in it! Blasphemers! 0 Share this post Link to post
sgtcrispy Posted July 24, 2001 They killed notgod.com! You Bastards!! Damn hackers... * SgtCrispy laughs and Fanatic 0 Share this post Link to post
Arioch Posted July 24, 2001 Check those Bugtraq lists ... it's really quite laughable. 0 Share this post Link to post
boris Posted July 24, 2001 What exactly makes you think that notgod is down because of that telnetd exploit? notgod is not really the most available server in the past and we all know that it goes down once in a while. 0 Share this post Link to post
Enjay Posted July 24, 2001 Doesn't notgod normally have a link at the side of the forums to a sort of gallery showing pages that 1337 HaX0rz (or whatever) have defaced? Or have I missed the point? 0 Share this post Link to post
Arioch Posted July 24, 2001 It was defaced when I woke up this morning. And now it's down. One very likely led to the other. 0 Share this post Link to post
Hirogen2 Posted July 24, 2001 or search for an ssh (win32) from "c.igaly" 0 Share this post Link to post
Arioch Posted July 24, 2001 Ah, but my point is, nobody should actually run the server portion of telnet (and by association the telnet client at all) ... instead one could use a sshd (server daemon) instead, which is much more secure. The best win32 ssh client is generally agreed to be puTTY (and it's free for download!) 0 Share this post Link to post
bond Posted July 24, 2001 "A potential remote root exploit has been discovered in SSH Secure Shell..." (http://www.ssh.com/products/ssh/exploit.cfm) no perfection in the world :) 0 Share this post Link to post
Arioch Posted July 24, 2001 http://www.securityfocus.com/templates/archive.pike?list=1&start=2001-07-15&mid=198404&end=2001-07-21&fromthread=0&threads=0& Read up. Not only does this vulnerability not affect OpenSSH, it only affects user accounts with a password field of 2 characters or less. 0 Share this post Link to post
Dan Posted July 24, 2001 They should switch to OpenBSD - there is no telnetd to exploit! -Dan 0 Share this post Link to post
fraggle Posted July 24, 2001 Yes there is, it just isnt on by default. The same is true in most modern linux distributions. 0 Share this post Link to post
Bloodshedder Posted July 24, 2001 The site seems to be working perfectly now. 0 Share this post Link to post
Guest Fanatic Posted July 24, 2001 Also check out WinSCP (for Windows clients). This one is rather nice too (I believe it's based off putty). http://winscp.vse.cz/eng/ 0 Share this post Link to post
Hirogen2 Posted July 25, 2001 the only thing is missing: someone cracks the rc5 code in some hours 0 Share this post Link to post
Guest Virgil_ Posted July 25, 2001 LISTEN!! ZDOOM's home page is http://zdoom.notgod.com NOT http://www.notgod.com DO I HAVE TO REPEAT MYSELF?! sheesh :) [i]Virgil] 0 Share this post Link to post
Guest Virgil_ Posted July 25, 2001 And yes the reason why I got zdoom's homapage URL memorized is because I have no life, so there :P Virgil 0 Share this post Link to post
Guest Virgil_ Posted July 25, 2001 Still... ZDOOM's homepage is no longer defaced if it ever was. Its back up working just fine. Did they fix it or something? Virgil 0 Share this post Link to post
Guest billyjoejimbob Posted July 25, 2001 Perhaps the sysadmin simply fucked up the virtual hosts and everything was defaulting to the wrong directory. I've seen it happen before. Thats my guess as to what happened instead of them being hacked. 0 Share this post Link to post
Afterglow Posted July 26, 2001 http://www.doomworld.com/news/followupgen.php3?news_id=646456546546546456456456546456546456 3y3 4m 4n 31337 h4x0r 0 Share this post Link to post
Guest PenGun Posted July 26, 2001 No one with a brain has run telnet on a public server for years. Dumb. 0 Share this post Link to post
Arioch Posted July 26, 2001 Lots of allegedly smart people still run telnet on public servers. Dunno why. 0 Share this post Link to post
Hirogen2 Posted July 26, 2001 Arioch: 'Cause they do not know that SSH exist? -- www.doomworld.com/news/followupgen.php3?news_id=0 / same 0 Share this post Link to post