[Info-vax] VMS v8.4 disk corruption

Michael Moroney moroney at world.std.spaamtrap.com
Wed Aug 11 12:03:58 EDT 2010


koehler at eisner.nospam.encompasserve.org (Bob Koehler) writes:

>In article <4c61bfa2$0$6090$c3e8da3 at news.astraweb.com>, JF Mezei <jfmezei.spamnot at vaxination.ca> writes:
>> 
>> Personally, I find the ability to see what passwords are being used
>> during an attack to be extremely important. Telling whether they are
>> using radom/common passwords from a dictionary or whether they are using
>> brute force, or whether they seem to have a valid password are all very
>> important distinctions.

>   How do you know what the valid password is for someone else's
>   account?  Or are you the only user on these systems?

I've seen things where breakin messages were going to the operator's
console with things like this:

Breakin attempt for user FOOBAR
...
Password: SEXYLADY1

Breakin attempt for user FOOBAR
...
Password: SEXYLADY2

Breakin attempt for user FOOBAR
...
Password: SEXYLADY3

Breakin attempt for user FOOBAR
...
Password: <valid>

Breakin attempt for user FOOBAR
...
Password: SEXYLADY5
...

The actual incorrect passwords are part of the OPCOM message, and a
valid password was replaced by the string "<valid>". 
The login was denied due to breakin evasion already in force.
It can be obvious from the pattern what the real password is.
Regardless, it's definite that they did enter a valid password.

This is how it worked a while ago, I don't know what it does now.





More information about the Info-vax mailing list