06 Oct 16 10:10, you wrote to Janis Kracht:   
      
    JK>> I switched back to net2bbs on my ezycom box, and for the most part it   
    JK>> Last night when even iptables failed for the telnet port (some   
    JK>> weirdness there because it works on the http port), I switched to a   
    JK>> different telnet port.. I've probably got maybe a week before the   
    JK>> 'sniffers' find it .   
      
    SH> I took a beating last night. ;) They are able to bring the whole   
    SH> thing down to a halt after they hammer it about a million times in a   
    SH> minute. hahaha   
      
   i'm just not seeing that kind of traffic over here...   
      
    SH> I'm just glad we use binkp to transfer mail... If people were still   
    SH> using mailer over telnet we'd all be in a pickle. ;)   
      
   them beating on my FrontDoor mailer is exactly how i started tracking them   
   back in june or july... that was when i wrote my first IDS/IPS rules to try   
   catching and blocking them... i was seeing their character strings in FD's   
   DFRS (Data From Ring Signal aka CallerID) logging on the WFC screen... it was   
   early august when i posted to the "emerging threats" mailing list with the   
   rule inquiring about possible better and more efficient ways to go... they   
   published my rules after testing them in their honeypots... one was adjusted   
   and the others accepted as is... since then, i've gone a bit of another way   
   but still retain the base detection technique...   
      
   the only ones i haven't been able to fire an alert on are those that do not   
   emit any character strings when they connect... i'm not sure they are the same   
   but they may be... i need to spend a ""bit"" more time analysing the telnet   
   data they are sending but i don't think there's anything going on there...   
   binary protocol analysis can be rather tedious, if you know what i mean ;)   
      
   )\/(ark   
      
   Always Mount a Scratch Monkey   
   Do you manage your own servers? If you are not running an IDS/IPS yer doin' it   
   wrong...   
   ... Sneaker Net - walk floppies between 2 computers.   
   ---   
    * Origin: (1:3634/12.73)   
|