From owner-freebsd-chat Tue Jul 28 18:28:08 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id SAA06388 for freebsd-chat-outgoing; Tue, 28 Jul 1998 18:28:08 -0700 (PDT) (envelope-from owner-freebsd-chat@FreeBSD.ORG) Received: from granite.sentex.net (granite.sentex.ca [199.212.134.1]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id SAA06307 for ; Tue, 28 Jul 1998 18:27:34 -0700 (PDT) (envelope-from mike@sentex.net) Received: from ospf-mdt.sentex.net (ospf-mdt.sentex.net [205.211.164.81]) by granite.sentex.net (8.8.6/8.6.9) with SMTP id VAA15731 for ; Tue, 28 Jul 1998 21:26:55 -0400 (EDT) From: mike@sentex.net (Mike Tancsa) To: freebsd-chat@FreeBSD.ORG Subject: Re: QPopper exploit Date: Wed, 29 Jul 1998 01:24:55 GMT Message-ID: <35be78f0.278958611@mail.sentex.net> References: In-Reply-To: X-Mailer: Forte Agent .99e/32.227 Sender: owner-freebsd-chat@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On 27 Jul 1998 22:24:39 +0200, in sentex.lists.freebsd.misc you wrote: >If I were a cracker, the first thing I'd try would be to scan IP >ranges known to belong to large ISPs' dialup servers, precisely for >that reason (and also because there's a much higher chance of finding >machines run by inexperienced or careless people there than amongst >permanently connected hosts) I see on a daily basis whole scale spoofing attempts on our dialup IPs directed at the NetBEUI ports... I guess winnuke attempts... Not to mention the odd smurf attempt, ping flood etc... Its rather discouraging at times to see this level of activity :-( I could only guess how often more 'popular' targets get attacked. We are only a 6000 user ISP. Imagine how much AOL and Microsoft must see. ---Mike To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-chat" in the body of the message