Full Disclosure mailing list archives
RE: Probes on port 389
From: "Schmehl, Paul L" <pauls () utdallas edu>
Date: Wed, 25 Feb 2004 12:17:00 -0600
-----Original Message----- From: full-disclosure-admin () lists netsys com [mailto:full-disclosure-admin () lists netsys com] On Behalf Of John Sage Sent: Wednesday, February 25, 2004 10:46 AM To: full-disclosure () lists netsys com Subject: Re: [Full-disclosure] Probes on port 389 Just picked this up:
Looks like exploit code for the Ipswitch overflow. I've corresponded with another person who saw scans similar to mine followed by directed attacks at Ipswitch servers on his network. So it appears that the scans are id'ing potential victims and are followed by exploit code to attempt the breakin. Pretty typical stuff. Paul Schmehl (pauls () utdallas edu) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu/~pauls/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Probes on port 389 Schmehl, Paul L (Feb 24)
- Re: Probes on port 389 John Sage (Feb 24)
- Re: Probes on port 389 John Sage (Feb 25)
- RE: Probes on port 389 Aditya, ALD [Aditya Lalit Deshmukh] (Feb 27)
- <Possible follow-ups>
- RE: Probes on port 389 Lee Fisher (Feb 24)
- RE: Probes on port 389 Schmehl, Paul L (Feb 25)
- Re: Probes on port 389 Frank Boldewin (Feb 25)