On 29 Dec 2012, at 12:32, Johnny Billquist <bqt at softjar.se> wrote:
On 2012-12-29 18:21, sampsa at
mac.com wrote:
I occasionally get people trying to get into the Internet facing parts of my stuff, I
usually reply with these:
--- cznmap --- runs nmap at timing=INSANE to find open ports
nmap -T5 -sV $1
--- end cznmap ---
There's usually something serving HTTP, after which I run this:
--- fcku ---
while :
do
curl http://$1:$2/FUCKYOU &> /dev/null
done
--- end fcku ---
Stops the login attempts pretty quickly I've found.
I usually just ignore that stuff. There is constant probing of my web server on MIM.
It's kindof fun to see all kind of stuff they are trying. Also a good reference to see
all kind of problems and exploits that exists on Unix and Windows web servers...
(I *think* my RSX web server is actually pretty safe, but who knows )
I highly doubt any script kiddies would have RSX experience. ;)
Trying to retaliate would be an endless battle which I don't care about anyway...
But it is fun to see people fail. :-)
It is definitely fun to watch people try to break in to VMS. ;)
Johnny
--
Cory Smelosky
http://gewt.net/ Personal stuff!
http://gimme-sympathy.org/ My permanently-a-work-in-progress pet project.