On 2016-06-22 18:08, Jordi Guillaumes i Pons wrote:
 
 
 Thanks. I actually forgot to bring this up. I would be surprised if the script kiddies of
today would have the first clue on how to automate any penetration attack actually from
VMS... So it would be interesting to actually find out a bit more on what actually
happened on the originating side?
 
 At this precise moment, that IP address does not answer PING. Some hours ago, it had an
active FTP server which identified itself as SunOS. I didn?t catch the version. So there
is potentially exploitable stuff there. 
 
Well, I assume at the time it was the machine where QCOCAL was, but I 
still would not expect that the attack actually happened from VMS. But I 
would like to find out for sure.
  > Anyway, it
would be good to send a heads up to the operator. I can?t see any QCOCAL node in HECNET,
so I don?t know ho he is. 
 I copied the HECNET.idx file you have in the FAL default directory in MIM:: Isn?t that
the good one?
 DTR> ready hecnet
 DTR> find hecnet with node_name = "QCOCAL"
 [0 records found] 
 
Either you have an old copy, or something else on your side is broken.
On MIM::
DTR> show dictionary
The current dictionary is DU1:[DECNET]DECNET.DIC;1
DTR> show hecnet
DOMAIN HECNET
  USING NODE_REC
      ON US:[DECNET]HECNET.IDX;
DTR> find hecnet with node_name="QCOCAL"
[1 Record found]
DTR> print
No record selected, printing whole collection
  NODE                                NODE
  NAME  AREA NUMBER OWN              OWNER           ARCHITECTURE CPU
QCOCAL   1    550  susa Supratim Sanyal
                                                       ?
Unknown                         6-Jun-2016
	Johnny
-- 
Johnny Billquist                  || "I'm on a bus
                                   ||  on a psychedelic trip
email: bqt at softjar.se             ||  Reading murder books
pdp is alive!                     ||  tryin' to stay hip" - B. Idol