Home |
Search |
Today's Posts |
#1
![]() |
|||
|
|||
![]()
Are there any experience with attacks on ECHOLINK Ports 5198 - 5200 by
P2P connection ? Here something of similiar cases............................................. ...... http://www.pcwelt.de/news/sicherheit/81814/index.html http://www.pcwelt.de/news/sicherheit...etter&id=81814 |
#2
![]() |
|||
|
|||
![]()
bernado wrote:
Are there any experience with attacks on ECHOLINK Ports 5198 - 5200 by P2P connection ? That makes no sense to me. Here something of similiar cases............................................. ...... http://www.pcwelt.de/news/sicherheit/81814/index.html http://www.pcwelt.de/news/sicherheit...etter&id=81814 That's comparing apples and bananas. These attacks exploit a certain security hole in a certain piece of software (in this case the dc++ client, whatever that is). While the Echolink software *may* have some kind of security problems of its own aswell, it's very unlikely that crackers try to exploit them. There are (compared to P2P stuff) just not enough users to make it worthwhile. In any case, the attacks on this dc++ client, even if they are operating on the very same port as Echolink, are absolutely no danger or security risk for the Echolink software. 73, -- Fabian Kurz, DJ1YFK * Dresden, Germany * http://fkurz.net/ Online Log: http://dl0tud.tu-dresden.de/~dj1yfk/log.html |
#3
![]() |
|||
|
|||
![]()
Vielen Dank lieber OM für die wertvollen Ausführungen.
Wir beobachten diese Situation weiter, insbesondere das PORT scanning von 5198 - 5200 mit geografischer Nähe zu China. Täglich werden wir hier in Südostasien von diversen Servern aus China und Taiwan mit Port scans and andere Nicklichlichkeiten bombardiert und erfreut. |
#5
![]() |
|||
|
|||
![]()
With several complains and JUST after receiving of the last ticket
C4498619 from Everyones Internet and ThePlanet Abuse ALL PIRATE TEST PING ACTIONS of the 67.15.240. XX IP group disappears. Some significant links with the same experience and ICMP Type 8 (Echo) logs. http://www.tik.be/forum/viewtopic.ph...b454 d1ec02a6 http://www.fyhand.com/bbs/viewthread...extra=page%3D1 http://outpostfirewall.com/forum/sho...300#post152300 The last PIRATE FREE logs - with acceptance of port 66/67 activities. 27.06.2007 16:55:59 Windows "Server Message Block" Activity blockiert Eingehende TCP 125.26.124.201 4465 125.26.246.62 445 27.06.2007 17:02:03 Windows "DCOM RPC" Acitivity blockiert Eingehende TCP 221.5.41.36 6000 125.26.246.62 135 27.06.2007 17:13:04 DHCP Client Activity erlaubt Ausgehende UDP 255.255.255.255 67 68 27.06.2007 17:13:04 DHCP Client Activity erlaubt Eingehende UDP 10.0.0.138 67 125.26.246.62 68 27.06.2007 18:26:32 Windows "DCOM RPC" Acitivity blockiert Eingehende TCP 60.170.0.4 6000 125.26.246.62 135 27.06.2007 18:49:29 Windows "NetBIOS Name Service" Activity blockiert Eingehende UDP 201.69.106.214 1027 125.26.246.62 137 27.06.2007 19:33:26 Windows "DCOM RPC" Acitivity blockiert Eingehende TCP 222.178.117.17 6000 125.26.246.62 135 27.06.2007 20:13:34 Windows "DCOM RPC" Acitivity blockiert Eingehende TCP 59.36.100.187 6000 125.26.246.62 135 |
Reply |
Thread Tools | Search this Thread |
Display Modes | |
|
|
![]() |
||||
Thread | Forum | |||
(OT) : M... - Remember - The 9/11 Terrorist Attacks and never, Never. NEVER ! FORGET [.] | Shortwave | |||
Art Bell discussing Chupacabra attacks/sightings | Shortwave | |||
Vicious Attacks On GW? | CB | |||
Attacks on Haitian radio stations | Shortwave | |||
Similarity between coils and heart attacks "science" | Antenna |