cschie822_comcast (4)

Last Login: July 03, 2024
Assessments
1
Score
4

cschie822_comcast's Latest (2) Contributions

Sort by:
Filter by:
3
Ratings
  • Attacker Value
    Low
  • Exploitability
    Very Low
Technical Analysis

Doesn’t lend itself to an attackers needs. Takes a very long time to exploit, only works on a specific architecture (32bit), easily detected/blocked as malicious and requires access to a protocol (ssh) that is commonly hardened with access control lists.

2

interesting… your comments and your attacker value ratings don’t seem to line up.