Hello list, This isn't exactly an "incident", but it was suggested that I post this here. I've developed a technique for tracking down abusers of rotating proxy servers: RPAT - Realtime Proxy Abuse Triangulation http://www.unixwiz.net/rpat/ The short description: when an "attack" is observed, query the source via SNMP and suck down the netstat table to see who's talking to the proxy. Over time and enough different sources, one can "triangulate" back to the abuser. There are plenty of caveats, but I believe the technique is original. The writeup includes the perl source code. Happy holidays, all. Steve --- Stephen J Friedl | Software Consultant | Tustin, CA | +1 714 544-6561 www.unixwiz.net | I speak for me only | KA8CMY | steveat_private ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Fri Dec 20 2002 - 20:02:33 PST