Security Incidents mailing list archives
Re: explanation of port 1433 scans...
From: Matt.Carpenter () alticor com
Date: Thu, 16 May 2002 14:17:36 -0400
Also note that several high-profile hackers have made our governmental agencies look like fools by exploiting SQL-Human vulnerabilitied.... aka "Default Passwords" Locking SQL ports down to internal traffic only as well as keeping up-to-date on service patches seems only prudent. "Benjamin Tomhave" <falcon () cybersecret com> Hi Lists, Probably pointing out the obvious here, but thought to share info, since I had somehow missed these alerts... The May 15th SANS NewsBites had the following comments on port 1433 (MS SQL) scans as of late: <snip> ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
Current thread:
- explanation of port 1433 scans... Benjamin Tomhave (May 16)
- <Possible follow-ups>
- Re: explanation of port 1433 scans... Matt . Carpenter (May 16)