http://www2.merton.ox.ac.uk/~security/archive-199901/0057.html

/------------------------------------------/
Robert Zachary
Analyst
Information Security
Tandy Information Services
817.415.0675
[EMAIL PROTECTED] 

> -----Original Message-----
> From: Bojan Zdrnja [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, January 26, 2000 3:06 AM
> To: [EMAIL PROTECTED]
> Subject: Re: Netbus ?
> 
> 
> 
> TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of 
> your message to
> [EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help 
> with any problems!
> --------------------------------------------------------------
> --------------
> 
> On Fri, Jan 21, 2000 at 03:44:39PM -0600, Robert Zachary 
> <[EMAIL PROTECTED]> wrote:
> > 
> > Keep in mind that they may be also running this as a daemon 
> to lure script
> > kiddies. I have done this myself.  Do notify the 
> victimsystem as a courtesy.
> > 
> > Rob
> 
> > > > TCP Sequence Prediction: Class=random positive increments
> > > >                          Difficulty=34403 (Worthy challenge)
> > > > Remote operating system guess: FreeBSD 2.2.1 - 3.2
> > > >
> > > > Nmap run completed -- 1 IP address (1 host up) scanned 
> in 65 seconds
> > > >
> 
> NetBus runs only under Windows NT and 9x operating systems. 
> Your nmap tryed
> to guess remote operating system and it is definetly some 
> flavour of unix;
> you can see that by open ports (ftp, ssh, smtp, telnet ...).
> So, this is probably some kind of dameon to lure script 
> kiddies, as Robert
> said.
> Nmap checked only open ports, not real daemons that sit on them.
> 
> Regards, Bojan
> 
> 

Robert Zachary.vcf

Reply via email to