Page 3 of 3 FirstFirst 123
Results 21 to 24 of 24

Thread: bruteforce against vnc...

  1. #21
    Right turn Clyde Nokia's Avatar
    Join Date
    Aug 2003
    Location
    Button Moon
    Posts
    1,696
    That is what it stands for
    You said it stood for point of concept in an earlier post - make your mind up dood.

    the point of the term people can release code to exploit software and claim it to be for educational purposes only
    Not really oofki, like I said:

    if you don't understand the acronym, then don't use it or involve yourself in conversations about it
    PoC has nothing to do with the code being for educational purposes, malicious purposes or downright illegal purposes. The clue is in the words Proof of Concept

    Loosely speaking if you are proving a concept it means you are tyring to do something that no one has done before, as otherwise the concept would have already been proven. Therefore if I release a program that preforms a VNC dictionary attack I am not proving any concept (other than if my code works but that is using PoC in a different context), as someone has already proven this concept a long time ago.

    In very general terms - If I find a flaw that can be exploited in VNC that no one else knows about or has discovered before, that I have could have a PoC exploit. If I then code an app that exploits this bug then I will have released a PoC attack - if 5 years later someone releases a program that does they same thing for educational purposes, then this is not a PoC attack as I would have already proven the concept 5 years previously.

    So my original point which went over your head and does not even seem relevant anymore, was that the OP can't release a PoC attack that preforms a dictionary attack against VNC.
    Last edited by Nokia; November 5th, 2007 at 09:48 AM.

  2. #22
    THE Bastard Sys***** dinowuff's Avatar
    Join Date
    Jun 2003
    Location
    Third planet from the Sun
    Posts
    1,253
    Quote Originally Posted by Nokia
    A rule of thumb I have always found useful is that if you don't understand the acronym, then don't use it or involve yourself in conversations about it....and if you don't like acronyms then it's best not to work in IT....
    Now, now Nokia:

    Don't you know it's Extremely l337 to use acronyms?

    My favorites are MGD, THC, LSD, and HCl (for the enemies)

    /tangent
    09:F9:11:02:9D:74:E3:5B8:41:56:C5:63:56:88:C0

  3. #23
    AOs Resident Troll
    Join Date
    Nov 2003
    Posts
    3,152
    I love acronyms

    Some of my favs


    Lart
    Dilligaf
    RTFM

    MLF
    How people treat you is their karma- how you react is yours-Wayne Dyer

  4. #24
    THE Bastard Sys***** dinowuff's Avatar
    Join Date
    Jun 2003
    Location
    Third planet from the Sun
    Posts
    1,253
    The LART manual page.

    Written by Tim Bandy < timn8r[at]risk.cs.umn.edu >


    LART(1M) MISC. REFERENCE MANUAL PAGES LART(1M) NAME lart - Luser Attitude Readjustment Tool - use a lart to adjust lusers' attitudes
    SYNOPSIS lart [ -use tool ] [ -bBfFgklp ] <lusername>

    DESCRIPTION lart adjusts the attitudes of those pesky, clueless people who rely upon their admins for everything from picking their mice off of the floor to turning on their monitors; namely, the luser(8). Running lart with the appropriate arguments will cause the specified luser to run away screaming in agony. Alternatively, you can make the luser buy you a beer, after killing all of their processes.

    OPTIONS -use tool Choose your weapon. If this option is not specified, the enviroment variable LART is used. If neither is set, a default value will be used, which is set at compile time

    -b Used to increase the size of your lart

    -B The BOFH option. Removes a users files and kills all their processes. If used in conjunction with -p this will also cause syslog to make entries proving that <lusername> was the second gunman behind the grassy knoll

    -f Only fake luser's attitude readjustment session. Provided primarily for testing purposes. Mutually exclusive with -B

    -F fsck <lusername> as a raw device. Note that this option has not been tested, as it is rather difficult to find volunteers

    -g Graphic violence. Uses curses to monitor <lusername> during the beating.

    -k Kill. A rather permanent option, and as such is not highly recommended. Can only be invoked once per <lusername>

    -p See -B
    SEE ALSO sysadmin(1), guru(8), luser(8)
    09:F9:11:02:9D:74:E3:5B8:41:56:C5:63:56:88:C0

Similar Threads

  1. Auditor possibly the best security auditing linux distro
    By acdspit00 in forum Operating Systems
    Replies: 5
    Last Post: March 15th, 2006, 04:53 PM
  2. How do hackers...
    By tampabay420 in forum Newbie Security Questions
    Replies: 4
    Last Post: January 31st, 2003, 07:59 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •