| 
        
         PmWiki / 
          TestPagePmWiki.TestPage HistoryHide minor edits - Show changes to output Changed lines 5-9 from: 
         A custom attack tool has been been deployed on some Chinese IPs. This is a combination of a SSH scanner based on RAW socket and a SSH bruteforce tool. trying to get the low-hanging fruit (system with ssh root account protected by password) or maybe it is just a some organization using to: 
        -> A custom attack tool has been been deployed on some Chinese IPs. This is a combination of a SSH scanner based on RAW socket and a SSH bruteforce tool.   It tries to gain access to the root account of system via the ssh service. On an organisational level, it is possible there is a Chinese initiative trying to get the low-hanging fruit (system with ssh root account protected by password) or maybe it is just a some organization using some compromised Chinese IPs to try to get control other more boxes. Changed line 11 from: 
         We cover Broadband Internet connections, network security and system performance. A large section of SG focuses on Cable Modems and DSL technology, stressing on improving  TCP/IP performance over high speed/latency networks. to: 
        -> We cover Broadband Internet connections, network security and system performance. A large section of SG focuses on Cable Modems and DSL technology, stressing on improving  TCP/IP performance over high speed/latency networks. Changed lines 1-2 from: 
        to: 
        !! Attacks on ports 8085-86 from port 6000 Changed line 10 from: 
        to: 
        !! Security Resources  Added lines 1-14: 
        === Attacks on ports 8085-86 from port 6000 === https://home.regit.org/2014/02/chinese-scanner/ A custom attack tool has been been deployed on some Chinese IPs. This is a combination of a SSH scanner based on RAW socket and a SSH bruteforce tool. It tries to gain access to the root account of system via the ssh service. On an organisational level, it is possible there is a Chinese initiative trying to get the low-hanging fruit (system with ssh root account protected by password) or maybe it is just a some organization using some compromised Chinese IPs to try to get control other more boxes. === Security Resources === http://www.speedguide.net/ We cover Broadband Internet connections, network security and system performance. A large section of SG focuses on Cable Modems and DSL technology, stressing on improving TCP/IP performance over high speed/latency networks.  |