qole
|
2007-12-17
, 19:44
|
|
Moderator |
Posts: 7,109 |
Thanked: 8,820 times |
Joined on Oct 2007
@ Vancouver, BC, Canada
|
#31
|
|
2007-12-18
, 02:44
|
Posts: 156 |
Thanked: 44 times |
Joined on Dec 2007
|
#32
|
Someone gave the default password in the same thread as my description of the exploit.
|
2008-01-19
, 01:12
|
Posts: 17 |
Thanked: 0 times |
Joined on Dec 2007
|
#33
|
|
2008-01-20
, 15:39
|
|
Posts: 739 |
Thanked: 159 times |
Joined on Sep 2007
@ Germany - Munich
|
#34
|
|
2008-01-20
, 16:03
|
Posts: 334 |
Thanked: 55 times |
Joined on Aug 2007
@ Eastern Ontario, Canada
|
#35
|
|
2008-01-20
, 16:43
|
|
Posts: 739 |
Thanked: 159 times |
Joined on Sep 2007
@ Germany - Munich
|
#36
|
|
2008-03-13
, 09:12
|
Posts: 31 |
Thanked: 0 times |
Joined on Dec 2007
|
#37
|
|
2008-03-13
, 15:15
|
Posts: 4,556 |
Thanked: 1,624 times |
Joined on Dec 2007
|
#38
|
You'll need xterm and root access:
Take care, with the following steps, ssh will not start anymore at boot!
sudo gainroot
rm /etc/rc2.d/S20ssh
to revert the start at boot:
sudo gainroot
cd /etc/rc2.d
ln -s ../init.d/ssh S20ssh
To start ssh:
sudo gainroot
/etc/init.d/ssh start
To stop it:
/etc/init.d/ssh stop
You can also change the port ssh is listening:
/etc/default/ssh:
SSHD_OPTS="-p 666"
Will listen on port 666
|
2008-03-13
, 15:51
|
Posts: 3,841 |
Thanked: 1,079 times |
Joined on Nov 2006
|
#39
|
It's true the tablet _is open_ (in terms of UDP/TCP/IP connectivity, i.e. NO firewall on it), and you don't have to install a server software to be vulnerable.
|
2008-03-13
, 17:15
|
Posts: 364 |
Thanked: 54 times |
Joined on Feb 2008
|
#40
|