Re: [WISPA] [AFMUG] MK DOS Attack vulnerability

2012-05-15 Thread Mike Hammett
Cc: WISPA General List wireless@wispa.org, a...@afmug.com Sent: Monday, May 14, 2012 12:29:46 AM Subject: Re: [WISPA] [AFMUG] MK DOS Attack vulnerability On Mon, 2012-05-14 at 01:12 -0400, Josh Luthman wrote: http://gregsowell.com/?p=3773 Yeah. Greg said the same thing I did. :-) FWIW, port

Re: [WISPA] [AFMUG] MK DOS Attack vulnerability

2012-05-15 Thread Butch Evans
On Tue, 2012-05-15 at 20:23 -0500, Mike Hammett wrote: Are you one of those guys that think a system is only secure if it's never created in the first place? ;-) Are you kidding? lol. I think a system is only secure when the user INTENTIONALLY makes it so. I do, however, believe in REAL

Re: [WISPA] [AFMUG] MK DOS Attack vulnerability

2012-05-13 Thread Butch Evans
On Thu, 2012-05-10 at 17:43 +, Gino Villarini wrote: http://www.133tsec.com/2012/04/30/0day-ddos-mikrotik-server-side-ddos-attack/ And with a proper input firewall, this means what? Not a thing. Vulnerabilities, such as this one, are not an issue if you stop the attack before it can

Re: [WISPA] [AFMUG] MK DOS Attack vulnerability

2012-05-13 Thread Josh Luthman
http://gregsowell.com/?p=3773 Josh Luthman Office: 937-552-2340 Direct: 937-552-2343 1100 Wayne St Suite 1337 Troy, OH 45373 On Mon, May 14, 2012 at 12:48 AM, Butch Evans but...@butchevans.com wrote: On Thu, 2012-05-10 at 17:43 +, Gino Villarini wrote:

Re: [WISPA] [AFMUG] MK DOS Attack vulnerability

2012-05-13 Thread Butch Evans
On Mon, 2012-05-14 at 01:12 -0400, Josh Luthman wrote: http://gregsowell.com/?p=3773 Yeah. Greg said the same thing I did. :-) FWIW, port knocking and changing the port is NOT a good security mechanism, though both would likely thwart the bulk of the attacks on this vulnerability. --