lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <2147483647.1106344044@[192.168.2.101]> From: pauls at utdallas.edu (Paul Schmehl) Subject: Scan for IRC --On Friday, January 21, 2005 5:34 PM -0600 RandallM <randallm@...mail.com> wrote: > I am so sorry for interrupting the list. I'm trying to pick up IRC > communications on the network. I've made some filters for Ethereal and > Observer but can't seem to pick it up. I'm doing something wrong. Used the > 6668-6669 ports. Any help? > You'll have a lot more success using something like snort or tcpdump to catch them. For example, you could easily write a couple of rules that would catch any IRC communications, regardless of the port used. alert tcp $HOME_NET any -> any any (msg:"IRC communications"; content: JOIN; sid: 1000000; rev:1;) alert tcp $HOME_NET any -> any any (msg:"IRC communications"; content: PRIVMSG; sid: 1000001; rev:1;) Paul Schmehl (pauls@...allas.edu) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu
Powered by blists - more mailing lists