lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: se_cur_ity at hotmail.com (morning_wood) Subject: Odd logs ----- Original Message ----- From: "Muhammad Faisal Rauf Danka" <mfrd@...itudex.com> To: "Scott M. Algatt" <salgatt@...tleshell.net>; <full-disclosure@...ts.netsys.com> Sent: Wednesday, June 04, 2003 8:28 AM Subject: Re: [Full-Disclosure] Odd logs > Quick search reveals that it has been found on various web statistics as well. That concludes to the probability that it is a signature of some web/cgi scanning utility. > > Backdoor.OptixPro.11.b Trojan also by default uses the same port. > > Regards > -------- > Muhammad Faisal Rauf Danka Optix 1.1 uses port 3410 by default. Do not rely on someone elses port mappings. morning_wood http://exploitlabs.com
Powered by blists - more mailing lists