Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
More toys! Chuck Young GTE Internetworking ---------- Forwarded message ---------- Date: Thu, 08 Apr 1999 12:41:21 -0400 From: "Marcus J. Ranum" <mjr at nfr.net> To: firewall-wizards at nfr.net Subject: a fun new tool from us... Greetings - I've recently completed development and testing on a new tool which you can download from our website. It's a lightweight intrusion/scan detection agent for UNIX and Windows. Specifically, it's targetted at getting an idea of how much Back Orifice traffic is out there, and how often people are scanned (answer so far: a lot, and often) We (law enforcement, me, and a few friends) have already used it a couple times to bust script-kiddies. It's really useful as an educational tool for those who think that they're safe or not a target if they stay dialed-up to the Internet all day. I'd love to hear any results from a cable-modem connected user, to see if hackers are scanning there yet or not. Source code for a UNIX version is on our web site, along with a Win-32 executable that has a cool GUI and also detects port scans and can act as a spoofing server to record Telnet login attempts, etc. For more information see: http://www.nfr.net/bof mjr. (PS - to those of you on the list who were beta-test subjects: thank you all!) -- Marcus J. Ranum, CEO, Network Flight Recorder, Inc. work - http://www.nfr.net home - http://www.clark.net/pub/mjr - Subcription/unsubscription/info requests: send e-mail with "subscribe", "unsubscribe", or "info" on the first line of the message body to discuss-request at blu.org (Subject line is ignored).
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |