IP Spoofing can really hit you hard.
Running a datacenter I have received reports from a number of other DC's

then when doing the actual investigation I have to tell an engineer @ the other 
DC that they are wrong.

Retaliation is never a good thing - chances are you are hitting the wrong 
person.

Just my 2 cents 


On Oct 2, 2010, at 7:55 PM, Greg Ihnen wrote:

> How about the Backtrack toolset.
> 
> In the early days of the internet (for me) I would see people trying to 
> attack me so I'd use some script kiddie tools to throw attacks back at them. 
> If they weren't patched they'd go down. Often they'd go down.
> 
> Then again that was a colossal waste of time. It's better to just block them, 
> and once in a while look at your address list and see who's gotten put in the 
> sand box.
> 
> Greg
> 
> On Oct 2, 2010, at 7:18 PM, Robert West wrote:
> 
>> Or…………..!  A rule that will route them back to themselves!  Now THAT would 
>> be hilarious!!!
>>  
>> Bob-
>>  
>> From: [email protected] [mailto:[email protected]] On 
>> Behalf Of RickG
>> Sent: Saturday, October 02, 2010 12:56 AM
>> To: WISPA General List
>> Subject: Re: [WISPA] Brute Force Attack on Mikrotik Gateway
>>  
>> "But thinking back on  it, imagine the “Damn it!” looks on their faces if 
>> they DID get in only to find a nothing Mikrotik routerboard!"
>>  
>> LOL, it would be funny to have something connected that did nothing. Better 
>> yet, just reroute them to fbi.gov!
>> 
>> On Fri, Oct 1, 2010 at 10:22 PM, Robert West <[email protected]> 
>> wrote:
>> I’ve been migrating everything to a central location.  Not done yet but boy, 
>> have had a mess the past 3 weeks with the reconfiguring and moving of 
>> “stuff”.  As well as one major gateway out of the “solar” status to real 
>> grid power.  Finally!
>>  
>> Was interesting to watch the log, though.  I blocked every IP as it popped 
>> up then they switched from FTP to SSH.  Once SSH was blocked, they went the 
>> hell away.
>>  
>> But thinking back on  it, imagine the “Damn it!” looks on their faces if 
>> they DID get in only to find a nothing Mikrotik routerboard!  HA!
>>  
>>  
>>  
>> From: [email protected] [mailto:[email protected]] On 
>> Behalf Of Glenn Kelley
>> Sent: Friday, October 01, 2010 10:00 PM
>> To: WISPA General List
>> Subject: Re: [WISPA] Brute Force Attack on Mikrotik Gateway
>>  
>> Bob, 
>>  
>> If memory serves me correct - you do not have a central network - is that 
>> right?
>> instead your just using multiple pops via cable modems? 
>>  
>> If that is the case - it might be a bit more difficult - on the other hand - 
>> if you have switched to a central network (or have this in some places) 
>> than I can give you an easy transparent bridge solution @ no cost (just need 
>> one of your old pc's and 2 nics :-)  ) 
>>  
>>  
>> Let me know
>>  
>>  
>> On Oct 1, 2010, at 9:48 PM, Glenn Kelley wrote:
>>  
>> 
>>  
>> why not just block china (and other countries) from access unless it is 
>> something opened first from inside the network ?
>>  
>> Would make a big difference 
>>  
>> :-)
>>  
>>  
>>  
>> On Oct 1, 2010, at 9:28 PM, RickG wrote:
>>  
>> 
>> 61.155.5.247
>>  
>> _____________________________________________________________________________________
>> Glenn Kelley | Principle | HostMedic |www.HostMedic.com 
>>   Email: [email protected]
>> Pplease don't print this e-mail unless you really need to.
>>  
>> 
>> 
>> --------------------------------------------------------------------------------
>> WISPA Wants You! Join today!
>> http://signup.wispa.org/
>> --------------------------------------------------------------------------------
>> 
>> WISPA Wireless List: [email protected]
>> 
>> Subscribe/Unsubscribe:
>> http://lists.wispa.org/mailman/listinfo/wireless
>> 
>> Archives: http://lists.wispa.org/pipermail/wireless/
>>  
>> _____________________________________________________________________________________
>> Glenn Kelley | Principle | HostMedic |www.HostMedic.com 
>>   Email: [email protected]
>> Pplease don't print this e-mail unless you really need to.
>>  
>> 
>> 
>> 
>> --------------------------------------------------------------------------------
>> WISPA Wants You! Join today!
>> http://signup.wispa.org/
>> --------------------------------------------------------------------------------
>> 
>> WISPA Wireless List: [email protected]
>> 
>> Subscribe/Unsubscribe:
>> http://lists.wispa.org/mailman/listinfo/wireless
>> 
>> Archives: http://lists.wispa.org/pipermail/wireless/
>>  
>> 
>> 
>> --------------------------------------------------------------------------------
>> WISPA Wants You! Join today!
>> http://signup.wispa.org/
>> --------------------------------------------------------------------------------
>> 
>> WISPA Wireless List: [email protected]
>> 
>> Subscribe/Unsubscribe:
>> http://lists.wispa.org/mailman/listinfo/wireless
>> 
>> Archives: http://lists.wispa.org/pipermail/wireless/
> 
> 
> 
> --------------------------------------------------------------------------------
> WISPA Wants You! Join today!
> http://signup.wispa.org/
> --------------------------------------------------------------------------------
> 
> WISPA Wireless List: [email protected]
> 
> Subscribe/Unsubscribe:
> http://lists.wispa.org/mailman/listinfo/wireless
> 
> Archives: http://lists.wispa.org/pipermail/wireless/

_____________________________________________________________________________________
Glenn Kelley | Principle | HostMedic |www.HostMedic.com 
  Email: [email protected]
Pplease don't print this e-mail unless you really need to.


--------------------------------------------------------------------------------
WISPA Wants You! Join today!
http://signup.wispa.org/
--------------------------------------------------------------------------------
 
WISPA Wireless List: [email protected]

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

Reply via email to