Date: Wed, 29 Jul 1998 01:24:55 GMT From: mike@sentex.net (Mike Tancsa) To: freebsd-chat@FreeBSD.ORG Subject: Re: QPopper exploit Message-ID: <35be78f0.278958611@mail.sentex.net> In-Reply-To: <xzplnpf59fc.fsf@hrotti.ifi.uio.no> References: <xzplnpf59fc.fsf@hrotti.ifi.uio.no>
next in thread | previous in thread | raw e-mail | index | archive | help
On 27 Jul 1998 22:24:39 +0200, in sentex.lists.freebsd.misc you wrote: >If I were a cracker, the first thing I'd try would be to scan IP >ranges known to belong to large ISPs' dialup servers, precisely for >that reason (and also because there's a much higher chance of finding >machines run by inexperienced or careless people there than amongst >permanently connected hosts) I see on a daily basis whole scale spoofing attempts on our dialup IPs directed at the NetBEUI ports... I guess winnuke attempts... Not to mention the odd smurf attempt, ping flood etc... Its rather discouraging at times to see this level of activity :-( I could only guess how often more 'popular' targets get attacked. We are only a 6000 user ISP. Imagine how much AOL and Microsoft must see. ---Mike To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-chat" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?35be78f0.278958611>