Linux Security Labs 2nd Saturday Each mo...@noon - 3PM
Subject: Re: OT? Linux-based trojans now targeting WRT and other linux-based
routers
From: t...@supertunaman.com
To: plug-discuss@lists.plug.phoenix.az.us
Date: Fri, 27 Mar 2009 17:57:34 -0700
Excerpts from Charles Jones's
to agree with everyone in denial about the sad state of security.
Obnosis | (503)754-4452
PLUG Linux Security Labs 2nd Saturday Each mo...@noon - 3PM
Subject: Re: OT? Linux-based trojans now targeting WRT and other
linux-basedrouters
From: t
On Mon, 2009-03-30 at 08:30 -0400, kitepi...@kitepilot.com wrote:
And how do I:
starting by iptable deny all of china ?
I can figure out the iptable part, it is the china part (and other
possible places where I know I will only get spam from) that I am unaware
of...
I do not
Agree...
But for as long as my people doesn't have friends in Asia, I may as well
block them all... :)
Enrique
Craig White writes:
On Mon, 2009-03-30 at 08:30 -0400, kitepi...@kitepilot.com wrote:
And how do I:
starting by iptable deny all of china ?
I can figure out the iptable
with everyone in denial about the sad state of security.
Obnosis | (503)754-4452
PLUG Linux Security Labs 2nd Saturday Each mo...@noon - 3PM
Subject: Re: OT? Linux-based trojans now targeting WRT and other linux-based
routers
From: t...@supertunaman.com
To: plug-discuss
I'm gonna ignore most of the implications of this and just say one thing
that you're apparently not considering...
Once you implement a methodology, you then become committed to
maintaining the implementation and ip address ranges change, people go
to China for visiting, other people might have
Agree too...
Man, I hate intelligent people, they make me look sooo dumb!:)
Very valid point.
ET
Craig White writes:
I'm gonna ignore most of the implications of this and just say one thing
that you're apparently not considering...
Once you implement a methodology, you then become
Each mo...@noon - 3PM
Subject: Re: OT? Linux-based trojans now targeting WRT and other
linux-basedrouters
From: t...@supertunaman.com
To: plug-discuss@lists.plug.phoenix.az.us
Date: Fri, 27 Mar 2009 17:57:34 -0700
Excerpts from Charles Jones's message
: Monday, March 30, 2009 9:01 AM
To: plu@lists.plug.phoenix.az.usMain PLUG discussion list
Subject: Re: starting by iptable deny all of china is a good start. - Re:
OT?Linux-based trojans now targeting WRT and other linux-based routers
Excerpts from Charles Jones's message of Mon Mar 30 08:46:35
Linux Security Labs 2nd Saturday Each mo...@noon - 3PM
Subject: Re: OT? Linux-based trojans now targeting WRT and other
linux-basedrouters
From: t...@supertunaman.com
To: plug-discuss@lists.plug.phoenix.az.us
Date: Fri, 27 Mar 2009 17:57:34 -0700
Excerpts
Lisa Kachold wrote:
Well, the sad fact is that _any_ machine will kick over and barf it's guts
under distributed attacks; it just depends on what it does after the green
slime clears..
Also, it really helps if you run one that won't take WRT, or only runs on an
arm, with small memory
PLUG Linux Security Labs 2nd Saturday Each mo...@noon - 3PM
Date: Sat, 28 Mar 2009 03:13:32 -0700
From: technomage.ha...@gmail.com
To: plug-discuss@lists.plug.phoenix.az.us
Subject: Re: OT? Linux-based trojans now targeting WRT and other linux-based
routers
Lisa Kachold wrote:
Well
http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
Some parts of this article made me LOL. Like:
One type of malware connects primarily to a chat system such as IRC,
which your ordinary 14-year-old might join for the latest superstar gossip.
and:
Each IRC network
On Mar 27, 2009, at 2:19 PM, Charles Jones wrote:
http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
Find the comment titled It is a Cyber War a war between Linux and
Windows !!??. ROFL!
A lot of people believe that Linux OS and Linux NT is more secure
that
Interesting... How could one detect a trojan through, say, dd-wrt?
Excerpts from Charles Jones's message of Fri Mar 27 14:19:05 -0700 2009:
http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
Some parts of this article made me LOL. Like:
One type of malware
On Fri, Mar 27, 2009 at 2:19 PM, Charles Jones
charles.jo...@ciscolearning.org wrote:
A participant joining a channel who is not a human is usually a program
called a bot.
[snip]
The others are...? Is IRC accessible to aliens?
--
Thanks and best regards,
Ryan Rix
TamsPalm - The PalmOS
And once agian why Password security and closeing unused ports is your
first line in defense against getting Pwned
Attack vectors are primarily TELNET or SSH that listen on the
device's WAN interface, accepting weak passwords (such as admin).
---
although you would thing that they would shut these options down by
default in anything that is supposed to be used as a security
device... only open when enabled...
heck most base Linux distros are built on that.
On Fri, Mar 27, 2009 at 4:05 PM, Stephen cryptwo...@gmail.com wrote:
And once
maybe... would be an interesting way to snoop on us as a culture...
On Fri, Mar 27, 2009 at 4:03 PM, Ryan Rix phrkonale...@gmail.com wrote:
On Fri, Mar 27, 2009 at 2:19 PM, Charles Jones
charles.jo...@ciscolearning.org wrote:
A participant joining a channel who is not a human is usually a
Log in and run ps and look for rogue processes I guess. Or put a sniffer
upstream of it. Both are things that the casual hay I got a kewl router
from bestbuy user is never going to do.
Maybe there is a market for adding router pen-testing modules to AV
software :-) Although, at least 3
Excerpts from Charles Jones's message of Fri Mar 27 14:19:05 -0700 2009:
http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
Some parts of this article made me LOL. Like:
One type of malware connects primarily to a chat system such as IRC,
which your ordinary
| (503)754-4452
PLUG Linux Security Labs 2nd Saturday Each mo...@noon - 3PM
Subject: Re: OT? Linux-based trojans now targeting WRT and other linux-based
routers
From: t...@supertunaman.com
To: plug-discuss@lists.plug.phoenix.az.us
Date: Fri, 27 Mar 2009 17:57:34 -0700
Excerpts from
22 matches
Mail list logo