| Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On 12 Jan 2014, at 15:45, Kent Borg wrote:
> but I am thinking running such obsolete code when this is a hot target
> is also a bad idea.
Understood. I just ran the following and found some more potential
reflectors on my net, recommend others do the same:
$ sudo nmap -sU -pU:123 -Pn -n --script=ntp-monlist {target
host/network}
The hosts that give back real ntp peer information (vs. just showing as
having NTP in use) are those that need to be clamped down pronto.
-- dNb