[Date Prev][Date
Next][Thread Prev][Thread Next][Date
Index][Thread Index]
RE: Back to regular programming (but it is still Off topic)
- To: "'ukha_d@xxxxxxx'" <ukha_d@xxxxxxx>
- Subject: RE: Back to regular programming (but it is still Off
topic)
- From: "Broadfoot, Kieran J" <Kieran.Broadfoot@xxxxxxx>
- Date: Mon, 6 Aug 2001 09:55:39 +0100
- Delivered-to: rich@xxxxxxx
- Delivered-to: mailing list ukha_d@xxxxxxx
- Mailing-list: list ukha_d@xxxxxxx; contact
ukha_d-owner@xxxxxxx
- Reply-to: ukha_d@xxxxxxx
If you got hit this weekend that would have been code red II, a much more
virulent attack.
http://www.incidents.org/react/code_redII.php
telneting to port 80 should give someone an automatic root cmd.exe
hope this is of interest.
kieran
-----Original Message-----
From: Timothy Morris [mailto:timothy.morris@xxxxxxx]
Sent: Monday, August 06, 2001 9:53 AM
To: Ukha_D@Egroups. Com
Subject: [ukha_d] Back to regular programming (but it is still Off
topic)
If anyone is using ZoneAlarm you really ought to get hold of a copy of
zonelog (it only costs 8 quid!) (www.zonelog.com) I noticed that my
firewall
had been hit rather excessively over the weekend.
Rather than having to trail through the entire log file, I just loaded up
Zonelog and ran the Attack analyser. It showed me where the repeated probes
had come from, prepared an email report and performed a whois lookup
automatically.
I've just heard from one of the ISPs I emailed and it looks like I've been
a
victim of a "Code Red" attack :-(
Tim.
____________________________________
Automated Home UK
http://www.automatedhome.co.uk
____________________________________
Post message: ukha_d@xxxxxxx
Subscribe: ukha_d-subscribe@xxxxxxx
Unsubscribe: ukha_d-unsubscribe@xxxxxxx
List owner: ukha_d-owner@xxxxxxx
Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
Home |
Main Index |
Thread Index
|