>Not exactly off topic, but just as a question: >Has anyone had happen or heard of someone gaining shell access thru a >mud? It's been since bpl15 that I've had anything near stock, and even >with that, I couldn't really find any exploitable stack overflows (the >most common exploit method). I did not see anything wrong with the coding as far as a stack overflow. (yes, my point is that the circlemud people do great work) also, I would suspect it is not possible because the packets are handled by the circle process. so, more than likely, gaining access thru a mud is not feasible. Konigstein {yeah, yeah, we know, something about Madly Implementing} ________________________________________________________________ GET INTERNET ACCESS FROM JUNO! Juno offers FREE or PREMIUM Internet access for less! Join Juno today! For your FREE software, visit: http://dl.www.juno.com/get/web/. -- +---------------------------------------------------------------+ | FAQ: http://qsilver.queensu.ca/~fletchra/Circle/list-faq.html | | Archives: http://post.queensu.ca/listserv/wwwarch/circle.html | | Newbie List: http://groups.yahoo.com/group/circle-newbies/ | +---------------------------------------------------------------+
This archive was generated by hypermail 2b30 : 06/25/03 PDT