Re: What "methods" are being used

From: Darrin Wassom (Darrin.Wassomat_private)
Date: Wed May 02 2001 - 13:03:54 PDT

  • Next message: Fernando Cardoso: "Re: Found this in my logs"

    I didn't realize this file would garner so much interest! I put the zip file at the following site:
    
    http://www.netxinc.net/cnhonk/
    
    the file is called cnhonker.zip and is 1.4M - It looks fairly standard to me but I didn't really dig very deep. I'd be interested in hearing opinions. Thanks and let me know if you have problems getting the file.
    
    Darrin Wassom
    Technical Specialist
    Internet Architecture
    616.735.8417
    wassomdat_private
    
    >>> Meritt James <meritt_jamesat_private> 05/02/01 12:26PM >>>
    A variety of web defacements reportedly originating with the Chinese are
    being reported.  Anyone know what method(s) are being used?  This may be
    an indication of the number of discrete attackers (may not, but gotta
    make a guess.  Spoofed and bounced IPs are pretty much useless.)
    
    Thanks!
    
    V/R
    
    James W. Meritt, CISSP, CISA
    Booz, Allen & Hamilton
    phone: (410) 684-6566
    



    This archive was generated by hypermail 2b30 : Wed May 02 2001 - 14:06:26 PDT