lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4CE7DB75.4050908@rbsec.net>
Date: Sat, 20 Nov 2010 14:30:13 +0000
From: Robin <robin@...ec.net>
To: Marco van Berkum <marco@...t.nl>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: SSH scans, i caught one

Glancing through the OpenWRT platform list, it seems to be about 50/50
between ARM and MIPS (with a few other strange architectures in there).
The only router I've got to hand to check is a Belkin, which reports to
be MIPS based.

~Robin
> On 11/20/2010 02:58 PM, Robin wrote:
>> MIPS is very common in routers - most home ones I've seen are MIPS. As
>> for purpose, it's a good place to DDoS from, because it's very hard to
>> detect. It's also a very nice place to sniff passwords from, as you get
>> a whole network's traffic passing through, and it's extremely hard to
>> detect.
>
> Most homerouters I've seen are ARM, I actually never had a MIPS :)
> Guess its time to setup Qemu-MIPS to see what it does exactly.
>
> And maybe name it? If it's not a already known botnet that is.
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ