Recent Changes - Search:

Main

Project

edit SideBar

TestPage

PmWiki.TestPage History

Hide minor edits - Show changes to markup

October 31, 2014, at 04:07 PM by 68.58.166.108 -
Changed lines 5-9 from:
 A custom attack tool has been been deployed on some Chinese IPs. This is a combination of a SSH scanner based on RAW socket and a SSH bruteforce tool.
 It tries to gain access to the root account of system via the ssh service. On an organisational level, it is possible there is a Chinese initiative
 trying to get the low-hanging fruit (system with ssh root account protected by password) or maybe it is just a some organization using some compromised
 Chinese IPs to try to get control other more boxes.
to:
A custom attack tool has been been deployed on some Chinese IPs. This is a combination of a SSH scanner based on RAW socket and a SSH bruteforce tool. It tries to gain access to the root account of system via the ssh service. On an organisational level, it is possible there is a Chinese initiative trying to get the low-hanging fruit (system with ssh root account protected by password) or maybe it is just a some organization using some compromised Chinese IPs to try to get control other more boxes.
Changed line 11 from:
 We cover Broadband Internet connections, network security and system performance. A large section of SG focuses on Cable Modems and DSL technology, stressing on improving  TCP/IP performance over high speed/latency networks.
to:
We cover Broadband Internet connections, network security and system performance. A large section of SG focuses on Cable Modems and DSL technology, stressing on improving TCP/IP performance over high speed/latency networks.
October 31, 2014, at 04:06 PM by 68.58.166.108 -
Changed lines 1-2 from:

Attacks on ports 8085-86 from port 6000

to:

Attacks on ports 8085-86 from port 6000

Changed line 10 from:

Security Resources

to:

Security Resources

October 31, 2014, at 04:05 PM by 68.58.166.108 -
Added lines 1-14:

Attacks on ports 8085-86 from port 6000

https://home.regit.org/2014/02/chinese-scanner/

 A custom attack tool has been been deployed on some Chinese IPs. This is a combination of a SSH scanner based on RAW socket and a SSH bruteforce tool.
 It tries to gain access to the root account of system via the ssh service. On an organisational level, it is possible there is a Chinese initiative
 trying to get the low-hanging fruit (system with ssh root account protected by password) or maybe it is just a some organization using some compromised
 Chinese IPs to try to get control other more boxes.

Security Resources

http://www.speedguide.net/

 We cover Broadband Internet connections, network security and system performance. A large section of SG focuses on Cable Modems and DSL technology, stressing on improving  TCP/IP performance over high speed/latency networks. 
Edit - History - Print - Recent Changes - Search
Page last modified on October 31, 2014, at 04:07 PM