October 2008 Archives by author
Starting: Wed Oct 1 02:04:01 EDT 2008
Ending: Fri Oct 31 12:40:51 EDT 2008
Messages: 216
- [nsp-sec] DDOS target www.civil.ge 1Gbps 220kpps http mixed with udp
Hillar Aarelaid
- [nsp-sec] 15826 uniq source IPs OLD: DDOS target www.civil.ge 1Gbps 220kpps http mixed with udp
Hillar Aarelaid
- [nsp-sec] 15826 uniq source IPs OLD: DDOS target www.civil.ge 1Gbps 220kpps http mixed with udp
Hillar Aarelaid
- [nsp-sec] Yahoo email address catching password files - rootkit hosted at AS 21844
Daniel Adinolfi
- [nsp-sec] ssh attacker from AS32054 - UnderNet help? - FOLLOW-UP
Daniel Adinolfi
- [nsp-sec] IRC Controller in AS24139
Daniel Adinolfi
- [nsp-sec] Botnet info? (Attn: AS30506)
Daniel Adinolfi
- [nsp-sec] Bot C&C at AS 6389 (BellSouth)
Daniel Adinolfi
- [nsp-sec] Bot C&C at AS 6389 (BellSouth)
CASEY, JOEL J, ATTSI
- [nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
Chris Calvert
- [nsp-sec] Bracing For Impact... MS08-067
Chris Calvert
- [nsp-sec] Bracing For Impact... MS08-067
Chris Calvert
- [nsp-sec] ACK AS 852 - RE: List of compromised devices from MS08-067
Chris Calvert
- [nsp-sec] SWBell Contact
Campisano, Mario
- [nsp-sec] 48 hour vetting: Paul Cosgrove (Heanet, AS1213)
Aidan Carty
- [nsp-sec] 48 hour vetting: Joe Abley (Hopcount, AS5645)
Christopher Chin
- [nsp-sec] New IPV6 NDP issue (via cert)
Gert Doering
- [nsp-sec] New IPV6 NDP issue (via cert)
Gert Doering
- [nsp-sec] Apparent distributed Oracle attack.
Brian Epstein
- [nsp-sec] Looking for AS12880 contact, Tehran University
Brian Epstein
- [nsp-sec] ICANN vs EstDomains
Nicolas FISCHBACH
- [nsp-sec] Botnet info? (Attn: AS30506)
Tom Fischer
- [nsp-sec] Bot C&C at AS 6389 (BellSouth)
Tom Fischer
- [nsp-sec] Bracing For Impact... MS08-067
Tom Fischer
- [nsp-sec] Bracing For Impact... MS08-067
Tom Fischer
- [nsp-sec] Bracing For Impact... MS08-067
Tom Fischer
- [nsp-sec] Bracing For Impact... MS08-067
Tom Fischer
- [nsp-sec] Bracing For Impact... MS08-067
Tom Fischer
- [nsp-sec] Paging Level3
John Fraizer
- [nsp-sec] Anybody with contacts at Rackvibe?
John Fraizer
- [nsp-sec] Heads-up Surfnet / Peter
John Fraizer
- [nsp-sec] Bracing For Impact... MS08-067
John Fraizer
- [nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
David Freedman
- [nsp-sec] 48 hour vetting: Aaron Hughes (United Layer, AS23342)
David Freedman
- [nsp-sec] New IPV6 NDP issue (via cert)
David Freedman
- [nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
David Freedman
- [nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
David Freedman
- [nsp-sec] ATT help required
David Freedman
- [nsp-sec] Possible 700k+ node botnet
Stephen Gill
- [nsp-sec] 48 hour vetting: Joe Abley (Hopcount, AS5645)
Patrick W. Gilmore
- [nsp-sec] 48 hour vetting: Aaron Hughes (United Layer, AS23342)
Patrick W. Gilmore
- [nsp-sec] AS5713 - phishing drop box
Nishal Goburdhan
- [nsp-sec] Constant scanning from the same /24 in AS4837
Yiming Gong
- [nsp-sec] ACK 2828 ATLAS identified SSH brute forcers
Yiming Gong
- [nsp-sec] ACK 2914 Re: Possible 700k+ node botnet
Darren Grabowski
- [nsp-sec] Revealed - The "Brains" behind ESTHost/domains
Darren Grabowski
- [nsp-sec] Looking for Contact in AS7474
Adam Griffiths
- [nsp-sec] List of compromised devices from MS08-067
Peter Haag
- [nsp-sec] Good bye
Jonathan TSE Chi Hang
- [nsp-sec] enom^Wnetsol security POC?
Krista Hickey
- [nsp-sec] FW: enom^Wnetsol security POC?
Krista Hickey
- [nsp-sec] 48 hour vetting: Paul Cosgrove (Heanet, AS1213)
Nick Hilliard
- [nsp-sec] StarAdvisory, ACCE Internet, Prime Bandwidth, COM Universe, Vendor MGM Data, DHD
Aaron Hughes
- [nsp-sec] Possible 700k+ node botnet
Nicholas Ianelli
- [nsp-sec] Antivirus 2009, Compromised FTP account and modified .htaccess files - paging Earthlink and STARNETMD
Nicholas Ianelli
- [nsp-sec] Bracing For Impact... MS08-067
Nicholas Ianelli
- [nsp-sec] Bracing For Impact... MS08-067
Nicholas Ianelli
- [nsp-sec] Bracing For Impact... MS08-067
Nicholas Ianelli
- [nsp-sec] Bracing For Impact... MS08-067
Nicholas Ianelli
- [nsp-sec] Bracing For Impact... MS08-067
Nicholas Ianelli
- [nsp-sec] Public Exploit Available for MS08-067
Nicholas Ianelli
- [nsp-sec] Bracing For Impact... MS08-067
Nicholas Ianelli
- [nsp-sec] Bracing For Impact... MS08-067
Nicholas Ianelli
- [nsp-sec] Bracing For Impact... MS08-067
Nicholas Ianelli
- [nsp-sec] enom security POC?
Nicholas Ianelli
- [nsp-sec] List of compromised devices from MS08-067
Gabriel Iovino
- [nsp-sec] Anyone have an email contact at Prolexic?
Zane Jarvis
- [nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
Eronen Juhani
- [nsp-sec] Potential TCP / IP vulnerabilities announced
Eronen Juhani
- [nsp-sec] Intercage
Huopio Kauto
- [nsp-sec] ACK: Possible 700k+ node botnet
Huopio Kauto
- [nsp-sec] GoDaddy DNS server "hijacking" .com ?
Huopio Kauto
- [nsp-sec] ICANN vs EstDomains
Huopio Kauto
- [nsp-sec] 48 hour vetting: Joe Abley (Hopcount, AS5645)
Dave Knight
- [nsp-sec] 48 hour vetting: Joe Abley (Hopcount, AS5645)
Peter Losher
- [nsp-sec] 48 hour vetting: Paul Cosgrove (Heanet, AS1213)
Lyons, John
- [nsp-sec] 48 hour vetting: Aaron Hughes (United Layer, AS23342)
Chris Malayter
- [nsp-sec] Interesting attack aginst wachovia
Jared Mauch
- [nsp-sec] 48 hour vetting: Joe Abley (Hopcount, AS5645)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Aaron Hughes (United Layer, AS23342)
Scott A. McIntyre
- [nsp-sec] Fwd: nsp-security subscription notification
Scott A. McIntyre
- [nsp-sec] Fwd: nsp-security subscription notification
Scott A. McIntyre
- [nsp-sec] enom^Wnetsol security POC?
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Paul Cosgrove (Heanet, AS1213)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Joe Abley (Hopcount, AS5645)
Danny McPherson
- [nsp-sec] 48 hour vetting: Aaron Hughes (United Layer, AS23342)
Danny McPherson
- [nsp-sec] Possible 700k+ node botnet
Dave Mitchell
- [nsp-sec] Possible 700k+ node botnet
Dave Mitchell
- [nsp-sec] Possible 700k+ node botnet
Dave Mitchell
- [nsp-sec] 48 hour vetting: Aaron Hughes (United Layer, AS23342)
Dave Mitchell
- [nsp-sec] ACK: Possible 700k+ node botnet
Dave Mitchell
- [nsp-sec] Possible 700k+ node botnet
Dave Mitchell
- [nsp-sec] Ping Comcast
Dave Mitchell
- [nsp-sec] Yahoo email address catching password files - rootkit hosted at AS 21844
Dave Mitchell
- [nsp-sec] Possible 700k+ node botnet
Klaus Moeller
- [nsp-sec] List of compromised devices from MS08-067
Klaus Moeller
- [nsp-sec] DFN-CERT#12384 - DoS vs. 66.252.8.19 & 66.252.21.77
Klaus Moeller
- [nsp-sec] ATLAS identified SSH brute forcers
Mohamed, Liban [NTK]
- [nsp-sec] Attn gmail -- C99 PHP shell stuff
Peter Moody
- [nsp-sec] Paging Google
Peter Moody
- [nsp-sec] 48 hour vetting: Joe Abley (Hopcount, AS5645)
Chris Morrow
- [nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
Chris Morrow
- [nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
Chris Morrow
- [nsp-sec] Constant scanning from the same /24 in AS4837
Chris Morrow
- [nsp-sec] Constant scanning from the same /24 in AS4837
Chris Morrow
- [nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
Chris Morrow
- [nsp-sec] New IPV6 NDP issue (via cert)
Chris Morrow
- [nsp-sec] New IPV6 NDP issue (via cert)
Chris Morrow
- [nsp-sec] New IPV6 NDP issue (via cert)
Chris Morrow
- [nsp-sec] New IPV6 NDP issue (via cert)
Chris Morrow
- [nsp-sec] New IPV6 NDP issue (via cert)
Chris Morrow
- [nsp-sec] telus AS852
Chris Morrow
- [nsp-sec] Interesting attack aginst wachovia
Chris Morrow
- [nsp-sec] Bracing For Impact... MS08-067
Chris Morrow
- [nsp-sec] enom security POC?
Chris Morrow
- [nsp-sec] enom security POC?
Chris Morrow
- [nsp-sec] enom security POC?
Chris Morrow
- [nsp-sec] enom security POC?
Chris Morrow
- [nsp-sec] enom^Wnetsol security POC?
Chris Morrow
- [nsp-sec] enom security POC?
Chris Morrow
- [nsp-sec] enom security POC?
Chris Morrow
- [nsp-sec] RFI locations
Jose Nazario
- [nsp-sec] PHP bot with ddos - hosted in UK, attn AS29131, botnet in AS16276
Jose Nazario
- [nsp-sec] ATLAS identified SSH brute forcers
Jose Nazario
- [nsp-sec] 1 day ASProx activity report
Jose Nazario
- [nsp-sec] Attn gmail -- C99 PHP shell stuff
Jose Nazario
- [nsp-sec] Botnet info? (Attn: AS30506)
Jose Nazario
- [nsp-sec] Bracing For Impact... MS08-067
Jose Nazario
- [nsp-sec] Looking for contact in AS4771 or AS2764
Hank Nussbacher
- [nsp-sec] Anyone have an email contact at Prolexic?
Hank Nussbacher
- [nsp-sec] ssh attacker from AS32054 - UnderNet help? - FOLLOW-UP
Steven Orchard
- [nsp-sec] Anyone from Cox.net on the list?
Niels den Otter
- [nsp-sec] Bracing For Impact... MS08-067 -- ACK 12179
Mike Palladino
- [nsp-sec] Intercage
SURFcert - Peter
- [nsp-sec] dotTK contact anybody
SURFcert - Peter
- [nsp-sec] hotmail phishing dropbox
SURFcert - Peter
- [nsp-sec] Anybody with contacts at Rackvibe?
SURFcert - Peter
- [nsp-sec] Anybody with contacts at Rackvibe?
SURFcert - Peter
- [nsp-sec] Bracing For Impact... MS08-067
SURFcert - Peter
- [nsp-sec] hotmail phishing dropbox
SURFcert - Peter
- [nsp-sec] mchsi.com phishing dropbox
Peter Peters
- [nsp-sec] AS5713 - phishing drop box
Roper, Sara
- [nsp-sec] Big socks list for vip members (fwd) (fwd)
Joel Rosenblatt
- [nsp-sec] ACK 14 - Re: Possible 700k+ node botnet
Joel Rosenblatt
- [nsp-sec] Question on attack flow quantitiy
Joel Rosenblatt
- [nsp-sec] Question on attack flow quantitiy
Joel Rosenblatt
- [nsp-sec] New IPV6 NDP issue (via cert)
Jens Rosenboom
- [nsp-sec] New IPV6 NDP issue (via cert)
Jens Rosenboom
- [nsp-sec] Attn gmail -- C99 PHP shell stuff
Ross, Jason
- [nsp-sec] Possible 700k+ node botnet
Tom Sands
- [nsp-sec] ACK 174 RE: RFI locations
Shelton, Steve
- [nsp-sec] Srizbi bot help!?
Shelton, Steve
- [nsp-sec] New IPV6 NDP issue (via cert)
William Allen Simpson
- [nsp-sec] Amusing 419 discussing 419 [AS16399, AS36954, Googlemail drop box]
William Allen Simpson
- [nsp-sec] 48 hour vetting: Joe Abley (Hopcount, AS5645)
Smith, Donald
- [nsp-sec] Open SIP abuse
Smith, Donald
- [nsp-sec] Interesting attack aginst wachovia
Smith, Donald
- [nsp-sec] List of compromised devices from MS08-067
Smith, Donald
- [nsp-sec] List of compromised devices from MS08-067
Smith, Donald
- [nsp-sec] Open SIP abuse
Alfredo Sola
- [nsp-sec] ACK 71&151: Possible 700k+ node botnet
Helmut Springer
- [nsp-sec] fraud/phish webspace 212.97.132.139 @.DK - surftown at AS9120
Christoph Sprongl
- [nsp-sec] Paging Google
Harri Sylvander
- [nsp-sec] Possible 700k+ node botnet
Rob Thomas
- [nsp-sec] Possible 700k+ node botnet
Rob Thomas
- [nsp-sec] Possible 700k+ node botnet
Rob Thomas
- [nsp-sec] PHP bot with ddos - hosted in UK, attn AS29131, botnet in AS16276
Rob Thomas
- [nsp-sec] [ OT ] IRC botnet C&C map
Rob Thomas
- [nsp-sec] IRC Controller in AS24139
Rob Thomas
- [nsp-sec] Amusing 419 discussing 419 [AS16399, AS36954, Googlemail drop box]
Rob Thomas
- [nsp-sec] Bot C&C at AS 6389 (BellSouth)
Rob Thomas
- [nsp-sec] Botnet info? (Attn: AS30506)
Rob Thomas
- [nsp-sec] Botnet info? (Attn: AS30506)
Rob Thomas
- [nsp-sec] Botnet info? (Attn: AS30506)
Rob Thomas
- [nsp-sec] Bracing For Impact... MS08-067
Rob Thomas
- [nsp-sec] Bracing For Impact... MS08-067
Rob Thomas
- [nsp-sec] Bracing For Impact... MS08-067 - Should Be TCP 139/445
Rob Thomas
- [nsp-sec] Bracing For Impact... MS08-067
Rob Thomas
- [nsp-sec] Bracing For Impact... MS08-067
Rob Thomas
- [nsp-sec] List of compromised devices from MS08-067
Rob Thomas
- [nsp-sec] New service: The Malware Hash Registry
Rob Thomas
- [nsp-sec] List of compromised devices from MS08-067
Rob Thomas
- [nsp-sec] List of compromised devices from MS08-067
Rob Thomas
- [nsp-sec] Wannabrowser - possible embedded malcode
Rob Thomas
- [nsp-sec] GoDaddy DNS server "hijacking" .com ?
Johannes Ullrich
- [nsp-sec] GoDaddy DNS server "hijacking" .com ?
Johannes Ullrich
- [nsp-sec] GoDaddy DNS server "hijacking" .com ?
Johannes B. Ullrich
- [nsp-sec] botnet c&c: ping.q8still.net, AS27524
Marius Urkis
- [nsp-sec] Potential TCP / IP vulnerabilities announced midOctober - Outpost24 interview
Florian Weimer
- [nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
Florian Weimer
- [nsp-sec] Possible 700k+ node botnet
Florian Weimer
- [nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
Florian Weimer
- [nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
Florian Weimer
- [nsp-sec] New IPV6 NDP issue (via cert)
Florian Weimer
- [nsp-sec] GoDaddy DNS server "hijacking" .com ?
Florian Weimer
- [nsp-sec] GoDaddy DNS server "hijacking" .com ?
Florian Weimer
- [nsp-sec] Antivirus 2009, Compromised FTP account and modified .htaccess files - paging Earthlink and STARNETMD
Florian Weimer
- [nsp-sec] New IPV6 NDP issue (via cert)
Florian Weimer
- [nsp-sec] Botnet info? (Attn: AS30506)
Florian Weimer
- [nsp-sec] Question on attack flow quantitiy
Young Wes
- [nsp-sec] Anyone notice anything unusual from HANARO (9318) yesterday?
White, Gerard
- [nsp-sec] Bracing For Impact... MS08-067
White, Gerard
- [nsp-sec] Bracing For Impact... MS08-067 - Should Be TCP 139/445
White, Gerard
- [nsp-sec] Srizbi bot help!?
White, Gerard
- [nsp-sec] Daily Reports Summary for week ending 2008-10-06
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2008-10-13
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2008-10-20
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2008-10-27
Tim Wilde
- [nsp-sec] 48 hour vetting: Joe Abley (Hopcount, AS5645)
Bill Woodcock
- [nsp-sec] Questions: which factors should be considered to make a public network security index ( indicator)?
Yonglin ZHOU
- [nsp-sec] Apparent distributed Oracle attack.
jose nazario
- [nsp-sec] Attn gmail -- C99 PHP shell stuff
jose nazario
- [nsp-sec] Basic HTTP exploit bots
jose nazario
- [nsp-sec] ACK 2119 Possible 700k+ node botnet
bjorn.jensen at telenor.com
- [nsp-sec] Wannabrowser - possible embedded malcode
Matthew.Swaar at us-cert.gov
- [nsp-sec] Wannabrowser - possible embedded malcode
Matthew.Swaar at us-cert.gov
Last message date:
Fri Oct 31 12:40:51 EDT 2008
Archived on: Thu Jan 22 18:52:02 EST 2015
This archive was generated by
Pipermail 0.09 (Mailman edition).