Quoting Greg Farrell (greg at gregfarrell.org):
> In support of the idea that is was a password/key stolen or key logged
> somewhere both boxes had normal users cracked. Users who don't run any
At the risk of belabouring a point you already realise: An intruder who
enters using a stolen security token (e.g., SSH password captured on a
remote, compromised machine), masquerading as a legitimate user, can
then work at his leisure at escalating to root authority by searching
the system for vulnerable, privileged executables or libraries.
So, in that sense, normal user accounts are threat vectors, despite
their not running services.
Cheers, Linux: It is now safe to turn on your computer.
rick at linuxmafia.com
Maintained by the ILUG website team. The aim of Linux.ie is to
support and help commercial and private users of Linux in Ireland. You can
display ILUG news in your own webpages, read backend
information to find out how. Networking services kindly provided by HEAnet, server kindly donated by
Dell. Linux is a trademark of Linus Torvalds,
used with permission. No penguins were harmed in the production or maintenance
of this highly praised website. Looking for the
Indian Linux Users' Group? Try here. If you've read all this and aren't a lawyer: you should be!