| 
        
         PmWiki / 
          TestPagePmWiki.TestPage HistoryShow minor edits - Show changes to markup Changed lines 5-9 from: 
        A custom attack tool has been been deployed on some Chinese IPs. This is a combination of a SSH scanner based on RAW socket and a SSH bruteforce tool. It tries to gain access to the root account of system via the ssh service. On an organisational level, it is possible there is a Chinese initiative trying to get the low-hanging fruit (system with ssh root account protected by password) or maybe it is just a some organization using some compromised Chinese IPs to try to get control other more boxes. to: 
        A custom attack tool has been been deployed on some Chinese IPs. This is a combination of a SSH scanner based on RAW socket and a SSH bruteforce tool.   It tries to gain access to the root account of system via the ssh service. On an organisational level, it is possible there is a Chinese initiative trying to get the low-hanging fruit (system with ssh root account protected by password) or maybe it is just a some organization using some compromised Chinese IPs to try to get control other more boxes.
 
Changed line 11 from: 
        We cover Broadband Internet connections, network security and system performance. A large section of SG focuses on Cable Modems and DSL technology, stressing on improving TCP/IP performance over high speed/latency networks. to: 
        We cover Broadband Internet connections, network security and system performance. A large section of SG focuses on Cable Modems and DSL technology, stressing on improving  TCP/IP performance over high speed/latency networks.
 
Changed lines 1-2 from: 
        Attacks on ports 8085-86 from port 6000to: 
        Attacks on ports 8085-86 from port 6000Changed line 10 from: 
        Security Resourcesto: 
        Security ResourcesAdded lines 1-14: 
        Attacks on ports 8085-86 from port 6000https://home.regit.org/2014/02/chinese-scanner/ A custom attack tool has been been deployed on some Chinese IPs. This is a combination of a SSH scanner based on RAW socket and a SSH bruteforce tool. It tries to gain access to the root account of system via the ssh service. On an organisational level, it is possible there is a Chinese initiative trying to get the low-hanging fruit (system with ssh root account protected by password) or maybe it is just a some organization using some compromised Chinese IPs to try to get control other more boxes. Security Resourceshttp://www.speedguide.net/ We cover Broadband Internet connections, network security and system performance. A large section of SG focuses on Cable Modems and DSL technology, stressing on improving TCP/IP performance over high speed/latency networks.  |