to determine, since it suddenly starts showing AIM ports open. Once they
> target you successfully, they will insidiously continue to keep track of
> you; rather like trophy hunting.
> > >>> I could have done a complete defcon presentation on various routers
> by
> this time.
> > >>> Th
na" Harris
Sent: Monday, March 30, 2009 9:01 AM
To: "plu>"@lists.plug.phoenix.az.us>Main PLUG discussion list
Subject: Re: starting by iptable deny all of china is a good start. - Re:
OT?Linux-based trojans now targeting WRT and other linux-based routers
Excerpts from Charles Jone
gt; >>> I could have done a complete defcon presentation on various routers by
> >>> this time.
> >>> That's why I always suggest to everyone, if you see something strange,
> >>> you see something strange, report it, complain, study it, rathe
Agree too...
Man, I hate intelligent people, they make me look sooo dumb!:)
Very valid point.
ET
Craig White writes:
> I'm gonna ignore most of the implications of this and just say one thing
> that you're apparently not considering...
>
> Once you implement a methodology, you then bec
I'm gonna ignore most of the implications of this and just say one thing
that you're apparently not considering...
Once you implement a methodology, you then become committed to
maintaining the implementation and ip address ranges change, people go
to China for visiting, other people might have to
ething strange, you see something strange, report it, complain, study it, rather than continuing to agree with everyone in denial about the sad state of security.
Obnosis | (503)754-4452
PLUG Linux Security Labs 2nd Saturday Each mo...@noon - 3PM
Subject: Re: OT? Linux-based
Agree...
But for as long as my people doesn't have friends in Asia, I may as well
block them all... :)
Enrique
Craig White writes:
> On Mon, 2009-03-30 at 08:30 -0400, kitepi...@kitepilot.com wrote:
>> And how do I:
>> "starting by iptable deny all of china" ?
>>
>> I can figure out th
On Mon, 2009-03-30 at 08:30 -0400, kitepi...@kitepilot.com wrote:
> And how do I:
> "starting by iptable deny all of china" ?
>
> I can figure out the "iptable" part, it is the "china" part (and other
> possible places where I know I will only get spam from) that I am unaware
> of...
I do
continuing to agree with everyone in denial about the sad state of security.
> > Obnosis | (503)754-4452
> >
> >
> >
> >
> > PLUG Linux Security Labs 2nd Saturday Each mo...@noon - 3PM
> >
> >
> >
> >
> >
> >
&
dy it, rather than continuing
> to agree with everyone in denial about the sad state of security.
> Obnosis | (503)754-4452
>
>
>
>
> PLUG Linux Security Labs 2nd Saturday Each mo...@noon - 3PM
>
>
>
>
>
>
>> Subject: Re: OT? Linux-based t
| (503)754-4452
PLUG Linux Security Labs 2nd Saturday Each mo...@noon - 3PM
> Date: Sat, 28 Mar 2009 03:13:32 -0700
> From: technomage.ha...@gmail.com
> To: plug-discuss@lists.plug.phoenix.az.us
> Subject: Re: OT? Linux-based trojans now targeting WRT and other linux-based
> r
Lisa Kachold wrote:
> Well, the sad fact is that _any_ machine will kick over and barf it's guts
> under distributed attacks; it just depends on what it does after the green
> slime clears..
> Also, it really helps if you run one that won't take WRT, or only runs on an
> arm, with small memory t
tate of security.
Obnosis | (503)754-4452
PLUG Linux Security Labs 2nd Saturday Each mo...@noon - 3PM
> Subject: Re: OT? Linux-based trojans now targeting WRT and other linux-based
> routers
> From: t...@supertunaman.com
> To: plug-discuss@lists.plug.phoenix.az.us
> Date: Fri,
Excerpts from Charles Jones's message of Fri Mar 27 14:19:05 -0700 2009:
> http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
>
> Some parts of this article made me LOL. Like:
>
> "One type of malware connects primarily to a chat system such as IRC,
> which your ordina
Log in and run ps and look for rogue processes I guess. Or put a sniffer
upstream of it. Both are things that the casual "hay I got a kewl router
from bestbuy" user is never going to do.
Maybe there is a market for adding router pen-testing modules to AV
software :-) Although, at least 3 diffe
maybe... would be an interesting way to snoop on us as a culture...
On Fri, Mar 27, 2009 at 4:03 PM, Ryan Rix wrote:
>
>
> On Fri, Mar 27, 2009 at 2:19 PM, Charles Jones
> wrote:
>>
>> "A participant joining a channel who is not a human is usually a program
>> called a bot.
>
> [snip]
>
> The ot
although you would thing that they would shut these options down by
default in anything that is supposed to be used as a security
device... only open when enabled...
heck most base Linux distros are built on that.
On Fri, Mar 27, 2009 at 4:05 PM, Stephen wrote:
> And once agian why Password secu
And once agian why Password security and closeing unused ports is your
first line in defense against getting Pwned
"Attack vectors are primarily TELNET or SSH that listen on the
device's WAN interface, accepting weak passwords (such as admin)."
---
P
On Fri, Mar 27, 2009 at 2:19 PM, Charles Jones <
charles.jo...@ciscolearning.org> wrote:
> "A participant joining a channel who is not a human is usually a program
> called a bot.
>
[snip]
The others are...? Is IRC accessible to aliens?
--
Thanks and best regards,
Ryan Rix
TamsPalm - The PalmO
Interesting... How could one detect a trojan through, say, dd-wrt?
Excerpts from Charles Jones's message of Fri Mar 27 14:19:05 -0700 2009:
> http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
>
> Some parts of this article made me LOL. Like:
>
> "One type of malware c
On Mar 27, 2009, at 2:19 PM, Charles Jones wrote:
http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
Find the comment titled "It is a Cyber War a war between Linux and
Windows !!??". ROFL!
"A lot of people believe that Linux OS and Linux NT is more secure
tha
21 matches
Mail list logo