Re: tcp/554 scans

From: Kevin Patz (jambo_catat_private)
Date: Wed May 14 2003 - 06:16:14 PDT

  • Next message: Iso Mage: "More Info: DNS poisoning to Korean address"

    
     ('binary' encoding is not supported, stored as-is)
    In-Reply-To: <20030514004851.77851.qmailat_private>
    
    I've only been scanned once on that port, on 2/13/03 
    from 67.105.148.194 (w194.z067105148.nyc-
    ny.dsl.cnc.net).  My usual sources don't show any 
    vulns or trojans on this port, but then many trojans 
    don't necessarily listen on a particular port anymore.
    
    >I received a sequential tcp/554 scan of one of my
    >Class Cs.
    >
    >AFAIK tcp/554 is rtsp (Real Time Streaming Protocol).
    >Any known vulns in rtsp? Any other known guys sleeping
    >on that port? Anyone seeing this?
    >
    >Aaron
    
    ----------------------------------------------------------------------------
    *** Wireless LAN Policies for Security & Management - NEW White Paper ***
    Just like wired networks, wireless LANs require network security policies 
    that are enforced to protect WLANs from known vulnerabilities and threats. 
    Learn to design, implement and enforce WLAN security policies to lockdown enterprise WLANs.
    
    To get your FREE white paper visit us at:    
    http://www.securityfocus.com/AirDefense-incidents
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Wed May 14 2003 - 17:18:57 PDT