Slide 36 of 70
Notes:
Tom’s look-alike takes advantage of the open permissions at the X server end of the exploit. When run, it grabs a screen shot, keystrokes and some other things.
I don’t recall catching anyone with it.
Don’t mess with Tom.