http://www2.merton.ox.ac.uk/~security/archive-199901/0057.html
/------------------------------------------/
Robert Zachary
Analyst
Information Security
Tandy Information Services
817.415.0675
[EMAIL PROTECTED]
> -----Original Message-----
> From: Bojan Zdrnja [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, January 26, 2000 3:06 AM
> To: [EMAIL PROTECTED]
> Subject: Re: Netbus ?
>
>
>
> TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of
> your message to
> [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help
> with any problems!
> --------------------------------------------------------------
> --------------
>
> On Fri, Jan 21, 2000 at 03:44:39PM -0600, Robert Zachary
> <[EMAIL PROTECTED]> wrote:
> >
> > Keep in mind that they may be also running this as a daemon
> to lure script
> > kiddies. I have done this myself. Do notify the
> victimsystem as a courtesy.
> >
> > Rob
>
> > > > TCP Sequence Prediction: Class=random positive increments
> > > > Difficulty=34403 (Worthy challenge)
> > > > Remote operating system guess: FreeBSD 2.2.1 - 3.2
> > > >
> > > > Nmap run completed -- 1 IP address (1 host up) scanned
> in 65 seconds
> > > >
>
> NetBus runs only under Windows NT and 9x operating systems.
> Your nmap tryed
> to guess remote operating system and it is definetly some
> flavour of unix;
> you can see that by open ports (ftp, ssh, smtp, telnet ...).
> So, this is probably some kind of dameon to lure script
> kiddies, as Robert
> said.
> Nmap checked only open ports, not real daemons that sit on them.
>
> Regards, Bojan
>
>
Robert Zachary.vcf