Monkies with fire dude. On May 17, 2016 4:48 AM, "That One Guy /sarcasm" <thatoneguyst...@gmail.com> wrote:
> holy nuggets of hate. I just got done reading the 31 pages of hate, now i > remember why i dont ever go there > > On Tue, May 17, 2016 at 12:49 AM, That One Guy /sarcasm < > thatoneguyst...@gmail.com> wrote: > >> wow, port 19081 turns out to be pretty popular >> one im cleaning up now has a child connection active in it since i logged >> in, im curious what its doing >> >> On Mon, May 16, 2016 at 10:55 PM, Mathew Howard <mhoward...@gmail.com> >> wrote: >> >>> ...unless of course it gets on a PC at the office... in which case we'd >>> be in trouble. >>> >>> On Mon, May 16, 2016 at 10:53 PM, Mathew Howard <mhoward...@gmail.com> >>> wrote: >>> >>>> True! but that hasn't happened yet, and it still shouldn't get beyond >>>> that customer's radio. >>>> >>>> On Mon, May 16, 2016 at 9:35 PM, Mike Hammett <af...@ics-il.net> wrote: >>>> >>>>> Until it gets delivered via Flash or Java or something else... ;-) >>>>> >>>>> >>>>> >>>>> ----- >>>>> Mike Hammett >>>>> Intelligent Computing Solutions <http://www.ics-il.com/> >>>>> <https://www.facebook.com/ICSIL> >>>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> >>>>> <https://www.linkedin.com/company/intelligent-computing-solutions> >>>>> <https://twitter.com/ICSIL> >>>>> Midwest Internet Exchange <http://www.midwest-ix.com/> >>>>> <https://www.facebook.com/mdwestix> >>>>> <https://www.linkedin.com/company/midwest-internet-exchange> >>>>> <https://twitter.com/mdwestix> >>>>> The Brothers WISP <http://www.thebrotherswisp.com/> >>>>> <https://www.facebook.com/thebrotherswisp> >>>>> >>>>> >>>>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> >>>>> ------------------------------ >>>>> *From: *"Mathew Howard" <mhoward...@gmail.com> >>>>> *To: *"af" <af@afmug.com> >>>>> *Sent: *Monday, May 16, 2016 9:16:40 PM >>>>> *Subject: *Re: [AFMUG] ubnt malware >>>>> >>>>> If you have firewall rules at the edge of the network blocking the >>>>> management ports ti the airrouters that are on public IPs, they're >>>>> probably >>>>> fine. We still have some radios that are on old firmware, but I haven't >>>>> been able to find anything on our network that's infected. Fortunately, >>>>> when I was setting up the firewall rules to block access to the CPEs from >>>>> outside our network, I decided it was desirable to block customers from >>>>> being able to get to other customers radios as well... which should break >>>>> the self replicating part of this thing, so even if it does somehow get >>>>> into our network, it shouldn't be able to get far. >>>>> >>>>> That said, I'm updating everything that isn't on at least 5.6.2 right >>>>> away. >>>>> On May 16, 2016 8:41 PM, "That One Guy /sarcasm" < >>>>> thatoneguyst...@gmail.com> wrote: >>>>> >>>>> yeah, thats amazing me, one fella was complaining about how much of a >>>>> problem it would be to take a unit offline to get on a bench. I would >>>>> think >>>>> if things are that bad that your network is progressively shutting down, >>>>> convenience would be the least of your concerns. >>>>> >>>>> I have to investigate a couple anomalies on the network, in the back >>>>> of my mind Im hoping the air routers have been hit to put a nail in their >>>>> coffins so we cam go with mikrotiks as the CPE router instead >>>>> >>>>> On Mon, May 16, 2016 at 8:33 PM, Josh Reynolds <j...@kyneticwifi.com> >>>>> wrote: >>>>> >>>>>> Or threatening to sue because of their own personal ignorance and >>>>>> negligence. >>>>>> On May 16, 2016 8:32 PM, "Mike Hammett" <af...@ics-il.net> wrote: >>>>>> >>>>>>> A good amount of it is just people that don't know any better making >>>>>>> false observations. >>>>>>> >>>>>>> >>>>>>> >>>>>>> ----- >>>>>>> Mike Hammett >>>>>>> Intelligent Computing Solutions <http://www.ics-il.com/> >>>>>>> <https://www.facebook.com/ICSIL> >>>>>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> >>>>>>> <https://www.linkedin.com/company/intelligent-computing-solutions> >>>>>>> <https://twitter.com/ICSIL> >>>>>>> Midwest Internet Exchange <http://www.midwest-ix.com/> >>>>>>> <https://www.facebook.com/mdwestix> >>>>>>> <https://www.linkedin.com/company/midwest-internet-exchange> >>>>>>> <https://twitter.com/mdwestix> >>>>>>> The Brothers WISP <http://www.thebrotherswisp.com/> >>>>>>> <https://www.facebook.com/thebrotherswisp> >>>>>>> >>>>>>> >>>>>>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> >>>>>>> ------------------------------ >>>>>>> *From: *"That One Guy /sarcasm" <thatoneguyst...@gmail.com> >>>>>>> *To: *af@afmug.com >>>>>>> *Sent: *Monday, May 16, 2016 8:19:00 PM >>>>>>> *Subject: *[AFMUG] ubnt malware >>>>>>> >>>>>>> From what im reading in their forums something set off over the >>>>>>> weekend? or is it ubnt douche nozzles? >>>>>>> >>>>>>> It sounds almost as if this malware is actively being manipulated >>>>>>> (changing from key access to foul username/password, wandering control >>>>>>> ports, etc, like script kiddies found a new toy? >>>>>>> >>>>>>> is this thing self propagating from the device? >>>>>>> >>>>>>> -- >>>>>>> If you only see yourself as part of the team but you don't see your >>>>>>> team as part of yourself you have already failed as part of the team. >>>>>>> >>>>>>> >>>>> >>>>> >>>>> -- >>>>> If you only see yourself as part of the team but you don't see your >>>>> team as part of yourself you have already failed as part of the team. >>>>> >>>>> >>>>> >>>> >>> >> >> >> -- >> If you only see yourself as part of the team but you don't see your team >> as part of yourself you have already failed as part of the team. >> > > > > -- > If you only see yourself as part of the team but you don't see your team > as part of yourself you have already failed as part of the team. >