Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On 12 Jan 2014, at 15:45, Kent Borg wrote: > but I am thinking running such obsolete code when this is a hot target > is also a bad idea. Understood. I just ran the following and found some more potential reflectors on my net, recommend others do the same: $ sudo nmap -sU -pU:123 -Pn -n --script=ntp-monlist {target host/network} The hosts that give back real ntp peer information (vs. just showing as having NTP in use) are those that need to be clamped down pronto. -- dNb
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |