Date: Sun, 10 Oct 1999 19:03:36 -0500 (CDT) From: James Wyatt <jwyatt@rwsystems.net> To: Brooks Davis <brooks@one-eyed-alien.net> Cc: "Nicole H." <nicole@unixgirl.com>, freebsd-security@FreeBSD.ORG Subject: Re: scanning of port 12345 Message-ID: <Pine.BSF.4.10.9910101900340.71027-100000@bsdie.rwsystems.net> In-Reply-To: <Pine.GSO.4.10.9910101538390.28009-100000@orion.ac.hmc.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
Shareware hacking tool, what a concept if you think about it... (Yeah, can be used for good too, but most...) If you get into someone's machine with it, you have to send the password to the authors? A copy of the user's quicken files? You sign their name to the crack? My mind is reeling, but that ain't hard nowadays... Jy@ On Sun, 10 Oct 1999, Brooks Davis wrote: > On Sun, 10 Oct 1999, Nicole H. wrote: > > Why on earth would someone be scanning port 12345? Is this a new backdoor > > port? > > > > Oct 10 02:25:26 krell portsentry[14796]: attackalert: Connect from host: > > 195.235.210.171/195.235.210.171 to TCP port: 12345 > > That's the default port for netbus, a BackOriface like tool (the only real > difference is that it's shareware instead of free). To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9910101900340.71027-100000>