Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 29 Jul 1998 01:24:55 GMT
From:      mike@sentex.net (Mike Tancsa)
To:        freebsd-chat@FreeBSD.ORG
Subject:   Re: QPopper exploit
Message-ID:  <35be78f0.278958611@mail.sentex.net>
In-Reply-To: <xzplnpf59fc.fsf@hrotti.ifi.uio.no>
References:  <xzplnpf59fc.fsf@hrotti.ifi.uio.no>

next in thread | previous in thread | raw e-mail | index | archive | help
On 27 Jul 1998 22:24:39 +0200, in sentex.lists.freebsd.misc you wrote:
>If I were a cracker, the first thing I'd try would be to scan IP
>ranges known to belong to large ISPs' dialup servers, precisely for
>that reason (and also because there's a much higher chance of finding
>machines run by inexperienced or careless people there than amongst
>permanently connected hosts)

I see on a daily basis whole scale spoofing attempts on our dialup IPs
directed at the NetBEUI ports... I guess winnuke attempts... Not to
mention the odd smurf attempt, ping flood etc...  Its rather
discouraging at times to see this level of activity :-(

I could only guess how often more 'popular' targets get attacked.  We
are only a 6000 user ISP.  Imagine how much AOL and Microsoft must
see.
	---Mike

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-chat" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?35be78f0.278958611>