1 |
> |
2 |
> >> > Do they need telnet or ssh access, |
3 |
> >> |
4 |
> |
5 |
> Not telnet shell but this could be triggered with telnet/nc or even nmap, |
6 |
> hping, or tcpreplay - all of which could send an arbitrary payload to tcp |
7 |
> or udp ports. |
8 |
> |
9 |
For clarity, its probably best to specify if we're talking about client or |
10 |
server end. The original question was whether telnet or ssh access was |
11 |
required, that is, does the attacker require access to the telnetd or sshd. |
12 |
In GHOSTs case the answer is no, but if the attacker does have access and |
13 |
an account, all they need to do is execute a local binary that uses the |
14 |
older gethostbyname function rather than the newer getaddrinfo function, |
15 |
and pass it a long hostname to lookup. However, in this case its considered |
16 |
a local attack. |
17 |
|
18 |
The attackers tool of choice (client end) will depend on personal |
19 |
preference and the network service that provides the access for the attack. |