TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------

Hi all,

I do know that TrendMicro's OfficeScan uses port 12345 for client-server
communication. It did seemed very strange to me that an AV vendor uses this
port for one of their products, though. They should know better. But I don't
think OfficeScan runs on public-accessible servers. So Netbus might be
causing pain here...

Jean-Hugues

> -----Original Message-----
> From: Robert Zachary [mailto:[EMAIL PROTECTED]]
> Sent: Friday, January 21, 2000 10:45 PM
> To: [EMAIL PROTECTED]
> Subject: RE: Netbus ?
> 
> 
> TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of 
> your message to
> [EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help 
> with any problems!
> --------------------------------------------------------------
> --------------
> 
> Keep in mind that they may be also running this as a daemon 
> to lure script
> kiddies. I have done this myself.  Do notify the victimsystem 
> as a courtesy.
> 
> Rob
> 
> /------------------------------------------/
> Robert Zachary
> Analyst
> Information Security
> Tandy Information Services
> 817.415.0675
> [EMAIL PROTECTED] 
> 
> > -----Original Message-----
> > From: Gary McIntyre [mailto:[EMAIL PROTECTED]]
> > Sent: Friday, January 21, 2000 2:12 PM
> > To: [EMAIL PROTECTED]
> > Subject: Re: Netbus ?
> > 
> > 
> > TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of 
> > your message to
> > [EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help 
> > with any problems!
> > --------------------------------------------------------------
> > --------------
> > 
> > 
> > It certainly looks that way.  I know of no legitimate 
> > applications which
> > hold port 12345 open for sessions, besides NetBus.  Have you 
> > informed the
> > various victims of the problem?
> > 
> > Gary McIntyre
> > Network Consultant
> > LGS Group Inc.
> > [EMAIL PROTECTED]
> > 
> > This user's PGP Public Keys can be
> > obtained from certserver.pgp.com
> > 
> > ----- Original Message -----
> > From: "Data_surge <[EMAIL PROTECTED]>@LGS"
> > <IMCEANOTES-Data+5Fsurge+20+3CGn0+40datasurge+2Ecom+3E+40LGS@e
> > -commerce.com>
> > To: "[EMAIL PROTECTED]" 
> > <[EMAIL PROTECTED]>
> > Sent: Friday, January 21, 2000 2:40 PM
> > Subject: Netbus ?
> > 
> > 
> > >
> > > TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of 
> > your message
> > to
> > > [EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for 
> help with any
> > > problems!
> > > 
> > --------------------------------------------------------------
> > ------------
> > --
> > >
> > > Hey there all,
> > > Lately i have been scanning a number of host for record 
> > purposes, and on a
> > > number of large isp and e-commerce sites i have found a 
> > port open for
> > netbus
> > > the
> > > port is 12345  i did not beleive it at first and got my 
> > port listing docs
> > > out
> > > to verify that it was something elese and on both counts 
> it came up
> > > unverified.
> > > I can say safley say that the largest isp in my country has 
> > been ifected
> > > with
> > > netbus. Here is one of the logs.
> > > Starting nmap V. 2.3BETA13 by [EMAIL PROTECTED]
> > ( www.insecure.org/nmap/ )
> > > Interesting ports on the url ? (a ip:0)
> > > Port    State       Protocol  Service
> > > 21      open        tcp       ftp
> > > 22      open        tcp       ssh
> > > 23      open        tcp       telnet
> > > 25      open        tcp       smtp
> > > 53      open        tcp       domain
> > > 80      open        tcp       http
> > > 110     open        tcp       pop-3
> > > 111     open        tcp       sunrpc
> > > 443     open        tcp       https
> > > 12345   open       tcp      NetBus
> > >
> > > TCP Sequence Prediction: Class=random positive increments
> > >                          Difficulty=34403 (Worthy challenge)
> > > Remote operating system guess: FreeBSD 2.2.1 - 3.2
> > >
> > > Nmap run completed -- 1 IP address (1 host up) scanned in 
> 65 seconds
> > >
> > >
> > 
> > 
> > 
> > 
> 
> 

Reply via email to