Following is a packet dump from not long ago:

U 67.215.13.194:3532 -> x.x.x.x:5060
  ACK sip:[email protected] SIP/2.0..Via: SIP/2.0/UDP
67.215.13.194:3532;branch=1011001111110011111110100001011067.215.13.194x.x.x.x724021918;rport..Max-Forwards:
70..Contact: <sip:[email protected]:3532;transport=udp>..To:
<sip:[email protected]>..From
  :
<sip:[email protected]>;tag=21341467536-168237612213414675362134146753667.215.13.194..Call-ID:
286d8ab810001011100001100110111101011110

1011001111110011111110100001011067.215.13.194x.x.x.x.x7240219181f6d6ad010963112326111#21341467536-168237612213414675362134146753667.215.13.1
  94-497846270..CSeq: 1 ACK..User-Agent: X-Lite release 1006e stamp
34025..Content-Length: 0....

Anyone know what this specific attack attacks etc?

-- 

Best regards,
 Duane

http://www.freeauth.org - Enterprise Two Factor Authentication
http://www.nodedb.com - Think globally, network locally
http://www.sydneywireless.com - Telecommunications Freedom
http://e164.org - Global Communication for the 21st Century

"In the long run the pessimist may be proved right,
    but the optimist has a better time on the trip."



Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
--Bandwidth and Colocation Provided by http://www.api-digital.com--

asterisk-security mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-security

Reply via email to