lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <Pine.LNX.4.55.0307310955570.8601@afybt.areqp.hsy.rqh> From: jwiens at nersp.nerdc.ufl.edu (Jordan Wiens) Subject: DCOM RPC exploit IDS rule? On Wed, 30 Jul 2003, Joshua Thomas wrote: > 2) If so, how much activity in "the wild" has anyone seen on their IDS of > choice for this exploit? While most of our campus is filtered from netbios, the few hosts that have exceptions for one reason or another have been attacked on and off since we added a sig for it. Today, for example, we've had three attackers against those hosts. In general, some appear to be doing sequential scanning, others are more one-off in nature. -- Jordan Wiens, CISSP UF Network Incident Response Team (352)392-2061
Powered by blists - more mailing lists