From owner-freebsd-security Tue Oct 3 8:12:48 2000 Delivered-To: freebsd-security@freebsd.org Received: from nexus.newsouth.net (nexus.newsouth.net [64.90.1.66]) by hub.freebsd.org (Postfix) with ESMTP id E95D437B502 for ; Tue, 3 Oct 2000 08:12:44 -0700 (PDT) Received: from localhost (michael@localhost) by nexus.newsouth.net (8.10.1/8.10.1) with ESMTP id e93FChW21288 for ; Tue, 3 Oct 2000 11:12:43 -0400 (EDT) Date: Tue, 3 Oct 2000 11:12:43 -0400 (EDT) From: Michael Williams X-Sender: michael@nexus.newsouth.net To: security@freebsd.org Subject: Re: Script kiddies and port 12345 In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Tue, 3 Oct 2000, Justin Stanford wrote: > More than likely they are just looking for open shares on the SMB port > (139) and netbus servers on port 12345 - this is more within the reach and > ability of the average kiddie and is as common and occurence as dried > fruit :-) Yes, true. But if someone popped up with a new vulnerability for SMS (which runs on port 12345 on -our- network's NT machines, but I'm not an NT admin, so I don't know whether that's default), it would be neat. I like anything that supports the cause of BSD over Windows. :) Regards, Michael Williams To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message