Try this http://www.incidents.org/ .

-----Original Message-----
From: Kim Longenbaugh [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, November 20, 2001 8:46 AM
To: [EMAIL PROTECTED]
Subject: [FW-1] list of ports used in exploits/hacks


Is there a listing of ports used in hacks/exploits available?  That would
come in pretty handy and might be more useful for anyone trying to find out
if they're being attacked than the regular list of ports.

===============================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
===============================================

===============================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
===============================================

Reply via email to