> I'd guess someone is compiling a list of target IPs for future use; > SQL Server can be a valuable target, and misconfigured proxies could > be used to masquerade an attack. > > WinAmp leaves me baffled. Maybe someone can answer that part of the > equation. Often people with cable or dsl download a lot of mp3's because the bandwith is available. Perhaps also waiting for a winamp hole to surface for use with ddos nets? Perhaps one already exists which isn't known? - zenoat_private > > Cheers, > Luis Bruno > -- > First study the enemy. Seek weakness. > > ---------------------------------------------------------------------------- > This list is provided by the SecurityFocus ARIS analyzer service. > For more information on this free incident handling, management > and tracking system please see: http://aris.securityfocus.com > > ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Tue Jun 18 2002 - 15:07:21 PDT