Nah, that stuff is like pre-alpha stuff, was just a demo.
Want me to add your nodes to the HELP scanner?
On 29 Dec 2012, at 20:08, Dan Williams <williams.dan at gmail.com> wrote:
Hi,
Area 51 now has an info.txt on every node.
I am not showing up in the map you did the other day should I be worried ?
Dan
On 29 December 2012 10:36, <sampsa at mac.com> wrote:
If you don't want to send me a HLP file I can now automatically generate one from your INFO.TXT file.
Let me know if you want your node added to the automatically generated help file list.
Sampsa
Here's an example:
---- SNIP ----
Welcome to CHIMPY::, part of the SAMPSACOM network.
Currently active users for email include:
SAMPSA
DAVIDSON
We offer the following guest logons:
ACCOUNT - Use this to request an account on CHIMPY::
B4BBS - Gateway to the SAMPSACOM Bulletin Board System, B4BBS.
TETRIS - Awesome VT100 tetris game.
PYFFLE - A Python re-implementation of the coolest BBS software ever, Waffle
Thank you,
Sampsa Laine (CHIMPY::SAMPSA)
---
.BEGIN-HECNET-INFO
ADDR |NAME |OWNER |EMAIL |HARDWARE |OS |LOCATION |NOTES
8.401|CHIMPY|Sampsa Laine |sampsa at mac.com |AlphaServer DS10 |OpenVMS 8.3 |London, England |Main SAMPSACOM system, SMTP gateway (CHIMPYMAIL.COM)
8.400|GORVAX|Sampsa Laine |sampsa at mac.com |SIMH VAX on OSX/Intel |OpenVMS 7.3 |London, England |MULTINET bridge to Area 2, Area router
8.403|RHESUS|Sampsa Laine |sampsa at mac.com |HP rx2600 Dual 900MHz |OpenVMS 8.4E |London, England |File libraries available
8.500|PYFFLE|Sampsa Laine |system at pyffle.com|VMWare |Pyffle BBS |London, England |Waffle reimplementation BBS, log in as pyffle for access
.END-HECNET-INFO
---- SNIP ----
---
Sampsa Laine <sampsa at mac.com>
On 29 Dec 2012, at 19:57, Dave McGuire <mcguire at neurotica.com> wrote:
On 12/29/2012 10:00 AM, sampsa at mac.com wrote:
type nikkel::info.txt
%TYPE-W-SEARCHFAIL, error searching for NIKKEL::INFO.TXT;
-RMS-E-FND, ACP file or directory lookup failed
-SYSTEM-F-INVLOGIN, login information invalid at remote node
Won't work until there's a default FAL user and an INFO.TXT...
So what's supposed to be in this INFO.TXT file that everyone's been
talking about lately? I think I may be too much of a newcomer here to
know about it. Where should it be, and what should it contain?
-Dave
--
Dave McGuire, AK4HZ
New Kensington, PA
Hi,
Area 51 now has an info.txt on every node.
I am not showing up in the map you did the other day should I be worried ?
Dan
On 29 December 2012 10:36, <sampsa at mac.com> wrote:
If you don't want to send me a HLP file I can now automatically generate one from your INFO.TXT file.
Let me know if you want your node added to the automatically generated help file list.
Sampsa
On 29 Dec 2012, at 12:32, Johnny Billquist <bqt at softjar.se> wrote:
On 2012-12-29 18:21, sampsa at mac.com wrote:
I occasionally get people trying to get into the Internet facing parts of my stuff, I usually reply with these:
--- cznmap --- runs nmap at timing=INSANE to find open ports
nmap -T5 -sV $1
--- end cznmap ---
There's usually something serving HTTP, after which I run this:
--- fcku ---
while :
do
curl http://$1:$2/FUCKYOU &> /dev/null
done
--- end fcku ---
Stops the login attempts pretty quickly I've found.
I usually just ignore that stuff. There is constant probing of my web server on MIM. It's kindof fun to see all kind of stuff they are trying. Also a good reference to see all kind of problems and exploits that exists on Unix and Windows web servers...
(I *think* my RSX web server is actually pretty safe, but who knows )
I highly doubt any script kiddies would have RSX experience. ;)
Trying to retaliate would be an endless battle which I don't care about anyway...
But it is fun to see people fail. :-)
It is definitely fun to watch people try to break in to VMS. ;)
Johnny
--
Cory Smelosky
http://gewt.net/ Personal stuff!
http://gimme-sympathy.org/ My permanently-a-work-in-progress pet project.
On 12/29/2012 10:00 AM, sampsa at mac.com wrote:
type nikkel::info.txt
%TYPE-W-SEARCHFAIL, error searching for NIKKEL::INFO.TXT;
-RMS-E-FND, ACP file or directory lookup failed
-SYSTEM-F-INVLOGIN, login information invalid at remote node
Won't work until there's a default FAL user and an INFO.TXT...
So what's supposed to be in this INFO.TXT file that everyone's been
talking about lately? I think I may be too much of a newcomer here to
know about it. Where should it be, and what should it contain?
-Dave
--
Dave McGuire, AK4HZ
New Kensington, PA
On 12/29/2012 09:38 AM, Johnny Billquist wrote:
How loud is the 7720?
Nowhere near an 8650. :-)
That's for sure. ROAR!!
-Dave
--
Dave McGuire, AK4HZ
New Kensington, PA
I usually just ignore that stuff. There is constant probing of my web server on MIM. It's kindof fun to see all kind of stuff they are trying. Also a good reference to see all kind of problems and exploits that exists on Unix and Windows web servers...
(I *think* my RSX web server is actually pretty safe, but who knows...)
Trying to retaliate would be an endless battle which I don't care about anyway...
But attacking them back is kinda funny, oh here's one more script in case there's no HTTP:
--- gohydra ---
#p1 = host, p2 = port, p3 = service
hydra -P ~/words -l fuckyou -s $2 $1 $3
--- end gohydra ---
On 2012-12-29 18:21, sampsa at mac.com wrote:
I occasionally get people trying to get into the Internet facing parts of my stuff, I usually reply with these:
--- cznmap --- runs nmap at timing=INSANE to find open ports
nmap -T5 -sV $1
--- end cznmap ---
There's usually something serving HTTP, after which I run this:
--- fcku ---
while :
do
curl http://$1:$2/FUCKYOU &> /dev/null
done
--- end fcku ---
Stops the login attempts pretty quickly I've found.
I usually just ignore that stuff. There is constant probing of my web server on MIM. It's kindof fun to see all kind of stuff they are trying. Also a good reference to see all kind of problems and exploits that exists on Unix and Windows web servers...
(I *think* my RSX web server is actually pretty safe, but who knows...)
Trying to retaliate would be an endless battle which I don't care about anyway...
But it is fun to see people fail. :-)
Johnny
I occasionally get people trying to get into the Internet facing parts of my stuff, I usually reply with these:
--- cznmap --- runs nmap at timing=INSANE to find open ports
nmap -T5 -sV $1
--- end cznmap ---
There's usually something serving HTTP, after which I run this:
--- fcku ---
while :
do
curl http://$1:$2/FUCKYOU &> /dev/null
done
--- end fcku ---
Stops the login attempts pretty quickly I've found.
---
Sampsa Laine <sampsa at mac.com>
On 29 Dec 2012, at 18:43, sampsa at mac.com wrote:
On 29 Dec 2012, at 18:12, Johnny Billquist <bqt at softjar.se> wrote:
Sure. Why not. I can add a link on my page as well, and I could add a couple of links on my Hecnet page... I'll do that.
Anyone else have some web resource that would be nice to have a link to from the HECnet page?
Johnny
Actually since we're using GETs, we could put the link in the RESULTS, so it goes and gets the info for that node from the other service in another window.
Adding that now.
Sampsa
Done. Check out http://rhesus.sampsa.com/cgi-bin/hecnetinfo/hecnetinfo.com?q=chimpy
At the bottom of the info.txt is a link to your service.
Sampsa