lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1030545215.741.79.camel@black.snosoft.com> From: simon at snosoft.com (ATD) Subject: Administrivia Len, I just got back from Greece. Would you like my recon team to help you with any of these issues? If you have any ideas/needs please ask... On Fri, 2002-08-16 at 08:57, Len Rose wrote: > > The following IP's have been used to attack the list so far: > > 210.90.247.95 > 211.35.78.36 > 216.241.164.234 > 211.155.243.99 > 202.108.119.186 > 80.48.107.254 > 211.234.92.6 > 200.193.46.18 > 142.176.152.106 > 63.203.134.106 > 63.229.231.25 > 211.251.108.122 > 65.121.80.1 > 206.74.35.50 > 66.87.93.107 > 200.189.163.7 > 66.105.71.168 > 216.235.32.129 > 132.229.228.228 << This one actually tried to break into the mail server. > It's his Linux workstation at the Univ. > 198.144.201.178 << This one actually tried to bypass mailman's "security". > > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html > -- -ATD- That file you've been guarding, isn't. ------------------------------------------------------------------- Secure Network Operations, Inc | http://www.snosoft.com Cerebrum Project | cerebrum@...soft.com Strategic Reconaissance Team | recon@...soft.com ------------------------------------------------------------------- -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 232 bytes Desc: This is a digitally signed message part Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20020828/19e1d9ed/attachment.bin
Powered by blists - more mailing lists