Full Disclosure mailing list archives

RE: Attack profiling tool?


From: "Gareth Blades" <list.fulldisclosure () webscreen-technology com>
Date: Fri, 11 Jul 2003 09:41:25 +0100

I don't think this is the case because there is no data transfer after the
TCP sessionn is established. There is also no reason to connect almost 50
times.

-----Original Message-----
From: ph1zzle [mailto:ph1zzle () cogeco ca]
Sent: Thursday, July 10, 2003 21:17
To: Gareth Blades
Subject: Re: [Full-disclosure] Attack profiling tool?


I am not sure based on the info that you provided but it could possibly
be someone attempting to gain access to your system through the openssl
<= 0.9.6d info leak exploit. just a thought. even if you are not running
the relevent software to exploit, it could be some kiddy who doens't
know what he is looking for. Again this is just a thought, it could be
!@#$ all, altogher.



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: