On Tue, 7 Sep 2004 00:13:59 +0800, Roger Filomeno
<[EMAIL PROTECTED]> wrote:
> DIDS - distributed intrusion detection system, using snort, log
> uploader to dshield.org, blocklist script from dshield.org, and alerts
> from Internet Storm Center/Dshield.org

This is practical, but proactive. I'd like to show a successful
exploit, even with a contrived example.

Do you know any web apps with open cross-site scripting or SQL
injection vulnerabilities? I think that's the easiest way to get in
nowadays, even if all you can do with it is deface a webpage. That
gets attention.

> Honey Pot - used with snort. Fools an attacker to attack a fake system
> and logs all the activity, used to analyze intrusion methods  - uses
> perl. (didnt work for kevin mitnick.hmm)

I think the honeypots out there are meant to fool programs, not humans.
 
> Or... Maybe 110 telco grade servers on mosix cluster cracking verisign
> keys ;p..
> that would might get an attention ;p

I only have an hour! And one PC! :)
--
Philippine Linux Users' Group (PLUG) Mailing List
[EMAIL PROTECTED] (#PLUG @ irc.free.net.ph)
Official Website: http://plug.linux.org.ph
Searchable Archives: http://marc.free.net.ph
.
To leave, go to http://lists.q-linux.com/mailman/listinfo/plug
.
Are you a Linux newbie? To join the newbie list, go to
http://lists.q-linux.com/mailman/listinfo/ph-linux-newbie

Reply via email to