[rescue] SGI Irix / Indy question

Kevin kevin at mpcf.com
Sat Dec 20 18:08:09 CST 2003


Older versions of IRIX telnetd had a remote root exploit (overflow.)

http://downloads.securityfocus.com/vulnerabilities/exploits/irix-telnet.c

/KRM

On Thu, 20 Nov 2003 16:21:14 +0100
Walter Belgers <walter+rescue at belgers.com> wrote:

> Brooke Gravitt wrote:
> > Got to the /etc/shadow file and ran it through john( by copying
> > the entries to a file on my laptop and running john there.) No
> > dice. I guess
> 
> Too bad. Did you use a wordfile and -rules?
> I have a homebrew 40MB wordlist that works pretty well.
> 
> > someone can give me an exploit to get root on the box? It's got
> > ports 7, 11, 13,  21, 23, 37, 80, 512, 513, 541
> 
> Your best bet is to telnet to those ports, grab a banner (i.e.
> OPTIONS / HTTP/1.0 for port 80) and google for version string +
> vulnerability. I don't think ports 7, 11, 13, 37 will be very
> useful. Maybe there's an rexec (512), telnet (23), ftp (21) or web
> (80) exploit.
> 
> Walter.



More information about the rescue mailing list