cschie822_comcast (5)
Last Login: July 03, 2024
Assessments
1
Score
5
cschie822_comcast's Latest (2) Contributions
Sort by:
Filter by:
4
Technical Analysis
Doesn’t lend itself to an attackers needs. Takes a very long time to exploit, only works on a specific architecture (32bit), easily detected/blocked as malicious and requires access to a protocol (ssh) that is commonly hardened with access control lists.
interesting… your comments and your attacker value ratings don’t seem to line up.