lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030127010738.GA14148@whoi.edu>
From: kkrueger at outbox.whoi.edu (Karl A. Krueger)
Subject: 100 Worms per Second, Courtesy of Telstra

On Sun, Jan 26, 2003 at 04:48:30PM -0500, Mike Tancsa wrote:
> At 01:50 PM 26/01/2003 -0500, Karl A. Krueger wrote:
> >Pardon my delurk, but this is very strange worm behavior.  We are seeing
> >100 SQL Worms per second from a single IP address on Telstra.  This is
> 
> Perhaps a series of servers behind natted behind a single IP ?

I thought of that, but the machine has "dhcp" in its DNS hostname, which
made me think "client system":

203.50.0.215  ==  rsdhcp21.telstra.net

Thankfully, it seems that either my post here or my messages to Telstra
(the ones that didn't bounce) got through to someone ... or else they
just finally woke up and took their worm box down -- at least, it isn't
phl00ding us any more.

-- 
Karl A. Krueger <kkrueger@...i.edu>
Network Security -- Linux/Unix Systems Support -- Etc.
Woods Hole Oceanographic Institution


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ