Full Disclosure mailing list archives
RE: Attack profiling tool?
From: "Gareth Blades" <list.fulldisclosure () webscreen-technology com>
Date: Fri, 11 Jul 2003 09:41:25 +0100
I don't think this is the case because there is no data transfer after the TCP sessionn is established. There is also no reason to connect almost 50 times.
-----Original Message----- From: ph1zzle [mailto:ph1zzle () cogeco ca] Sent: Thursday, July 10, 2003 21:17 To: Gareth Blades Subject: Re: [Full-disclosure] Attack profiling tool? I am not sure based on the info that you provided but it could possibly be someone attempting to gain access to your system through the openssl <= 0.9.6d info leak exploit. just a thought. even if you are not running the relevent software to exploit, it could be some kiddy who doens't know what he is looking for. Again this is just a thought, it could be !@#$ all, altogher.
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Attack profiling tool? Gareth Blades (Jul 10)
- Re: Attack profiling tool? morning_wood (Jul 10)
- Re: Attack profiling tool? daniel uriah clemens (Jul 10)
- RE: Attack profiling tool? Gareth Blades (Jul 11)
- <Possible follow-ups>
- RE: Attack profiling tool? Gareth Blades (Jul 11)
- RE: Attack profiling tool? Gareth Blades (Jul 11)
- RE: RE: Attack profiling tool? Gareth Blades (Jul 11)
- RE: RE: Attack profiling tool? Ron DuFresne (Jul 11)
- RE: RE: Attack profiling tool? Gareth Blades (Jul 11)
- RE: RE: Attack profiling tool? Ron DuFresne (Jul 11)
- RE: RE: Attack profiling tool? Gareth Blades (Jul 11)
- RE: RE: Attack profiling tool? Ron DuFresne (Jul 11)
- RE: RE: Attack profiling tool? Gareth Blades (Jul 11)