Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 10 Oct 1999 19:03:36 -0500 (CDT)
From:      James Wyatt <jwyatt@rwsystems.net>
To:        Brooks Davis <brooks@one-eyed-alien.net>
Cc:        "Nicole H." <nicole@unixgirl.com>, freebsd-security@FreeBSD.ORG
Subject:   Re: scanning of port 12345
Message-ID:  <Pine.BSF.4.10.9910101900340.71027-100000@bsdie.rwsystems.net>
In-Reply-To: <Pine.GSO.4.10.9910101538390.28009-100000@orion.ac.hmc.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
Shareware hacking tool, what a concept if you think about it... (Yeah, can
be used for good too, but most...)

If you get into someone's machine with it, you have to send the password
to the authors? A copy of the user's quicken files? You sign their name to
the crack? My mind is reeling, but that ain't hard nowadays... Jy@

On Sun, 10 Oct 1999, Brooks Davis wrote:
> On Sun, 10 Oct 1999, Nicole H. wrote:
> >  Why on earth would someone be scanning port 12345?  Is this a new backdoor
> > port?
> >    
> > Oct 10 02:25:26 krell portsentry[14796]: attackalert: Connect from host:
> > 195.235.210.171/195.235.210.171 to TCP port: 12345
> 
> That's the default port for netbus, a BackOriface like tool (the only real
> difference is that it's shareware instead of free).



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9910101900340.71027-100000>