Earlier today I noticed I was getting a lot of TCP port 6515 proxies on
The List (http://www.mrhinkydink.com/proxies.htm ) Curious, I checked
one it and it gave me a VIA header of
1.1 Fran-PC (McAfee Relay Server 5.2.3)
Then I took a peek at the database. Nearly 1900 of these things since
That... ahem... particular company has had that particular page
(/MCS/email.apsx) in one form or another for a long time, since the late
90s at least, when it was a cgi app.
IIRC, at one time you could SPAM anyone through it, but they learned
their lesson and now you can only SPAM the
) in Chinese-speaking countries.
--Mr. Hinky Dink
walk like a mannequin
roll like a tyre
act on reaction
dodge the Big Spud Fryer
http://mrhinkydink.blogspot.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure
On Sun, 2011-08-07 at 16:27 -0400, valdis.kletni...@vt.edu wrote:
On Sat, 06 Aug 2011 19:59:23 EDT, Mr. Hinky Dink said:
23,000+ showed up in July. Over 16,000 new ones in the first week of
August. Somebody doesn't get it.
http://mrhinkydink.blogspot.com/2011/08/tcp-port-8909
23,000+ showed up in July. Over 16,000 new ones in the first week of
August. Somebody doesn't get it.
http://mrhinkydink.blogspot.com/2011/08/tcp-port-8909-proxies.html
See also...
http://mrhinkydink.blogspot.com/2011/04/insecure-defaults-in-ppliveav-client.html
As far as RDP is concerned, it's much simpler (and more fun!) to host an
Evil RDP Server than it is to hack into one. There is no end to the
shenanigans you can create or the havoc you can wreak, if you're into that
kind of thing (just sayin'... as a Big Time Security Professional™, I'm
not).
Vis7a and Server 2008, but I really haven't kept up with the tech).
- Original Message -
From: Thor (Hammer of God) t...@hammerofgod.com
To: Mr. Hinky Dink d...@mrhinkydink.com;
Full-Disclosure@lists.grok.org.uk
Sent: Saturday, March 27, 2010 12:09 PM
Subject: RE: [Full-disclosure] Possible
There is a section in RCP-Tcp Properties on the server under Environment for
Do not allow an initial program to be launched. Always show the desktop.
- Original Message -
From: wicked clown
To: Full-Disclosure@lists.grok.org.uk
Sent: Friday, March 26, 2010 5:04 AM
Subject:
).
-
The Hinky Dink Top 10 Koobface Infested Shitholes Report Reveals Where Web
2.0's Most PWN3D Users Live
Columbus, Ohio – March 22, 2010 – Mr. Hinky Dink, a Big Time Security
Professional™ today released an analysis of the spread of the Koobface worm.
Based on an exhaustive study of his database
Today I ran across this article...
http://www.nst.com.my/Current_News/NST/articles/20100320160620/Article/index_html
... in which it is noted that Kaspersky Labs recently discovered the
resurgence of the malicious programme (Koobface) and sounded the alarm.
Gentlemen, I beg to differ.
I first
Absolutely you are correct, but if you check the blog there are further
references up to last Friday. It was a tremendous, jaw-dropping flood of
Kooberz proxies the last two weeks. And it's still coming.
The point is us Little Guys are paying attention, too. And sometimes we
catch this
11 matches
Mail list logo