September 2009 Archives by author
Starting: Tue Sep 1 01:34:30 EDT 2009
Ending: Wed Sep 30 12:29:31 EDT 2009
Messages: 209
- [nsp-sec] Koobface C&Cs
Dave Woutersen (GOVCERT.NL)
- [nsp-sec] Paging Yahoo - Fwd: Cornell Warning Alert !!!
Daniel Adinolfi
- [nsp-sec] ACK: Attack on www.betinternet.com TCP/80
Rodolfo Baader
- [nsp-sec] ACK: More compromised ftp accounts
Rodolfo Baader
- [nsp-sec] ACK: Some more compromised ftp accounts
Rodolfo Baader
- [nsp-sec] CANTV poc?
Rodolfo Baader
- [nsp-sec] ACK - 37K+ Host Grum Botnet
Rodolfo Baader
- [nsp-sec] mariposa botnet drones
Rodolfo Baader
- [nsp-sec] Credential dropbox at AS 5413 ??
RuthAnne Bevier
- [nsp-sec] ACK: 37K+ Host Grum Botnet
Wim Biemolt
- [nsp-sec] ACK3561 More compromised ftp accounts
Buchanan, Mark
- [nsp-sec] Question about potentially compromised email credentials
Buchanan, Mark
- [nsp-sec] Question about potentially compromised emailcredentials
Buchanan, Mark
- [nsp-sec] ACK ASN852 - RE: More compromised ftp accounts
Chris Calvert
- [nsp-sec] Paging Gmail to the WCP
Chris Calvert
- [nsp-sec] ACK ASN852 - RE: KR DDoS C2 machines - 20090915
Chris Calvert
- [nsp-sec] ACK AS852 - RE: 37K+ Host Grum Botnet
Chris Calvert
- [nsp-sec] ACK AS852 - RE: mariposa botnet drones
Chris Calvert
- [nsp-sec] [ACK AS52] 37K+ Host Grum Botnet
Jason Chambers
- [nsp-sec] [ACK AS52] mariposa botnet drones
Jason Chambers
- [nsp-sec] ACK AS 1221 37K+ Host Grum Botnet
Chisholm, Glenn L
- [nsp-sec] Numerous 1 Gbps DDOS attacks
Chisholm, Glenn L
- [nsp-sec] KR DDoS C2 machines - 20090915
Sean Crandall
- [nsp-sec] Linux webserver botnet
Tom Daly
- [nsp-sec] ACK 174 RE: Linux webserver botnet
Tom Daly
- [nsp-sec] ACK 174 RE: Linux webserver botnet
Tom Daly
- [nsp-sec] Linux webserver botnet
Tom Daly
- [nsp-sec] AS 5538 or AS20965 on the list?
Tom Daly
- [nsp-sec] 48 hour vetting: Rob Shakir (GXN, AS5413)
Andy Davidson
- [nsp-sec] Credential dropbox at AS 5413 ??
Andy Davidson
- [nsp-sec] 37K+ Host Grum Botnet
Andy Davidson
- [nsp-sec] AS31708
Andy Davidson
- [nsp-sec] ATTN Qwest/Akamai....Re: More compromised ftp accounts
Brian Eckman
- [nsp-sec] ATTN Qwest/Akamai....Re: More compromised ftp accounts
Brian Eckman
- [nsp-sec] ACK AS217 Re: 37K+ Host Grum Botnet
Brian Eckman
- [nsp-sec] 48 hour vetting: Rob Shakir (GXN, AS5413)
David Freedman
- [nsp-sec] HTTP attack against 95.172.6.122 - IP list
David Freedman
- [nsp-sec] [ACK AS8426] mariposa botnet drones
David Freedman
- [nsp-sec] [ACK 3701] 37K+ Host Grum Botnet
Stephen Fromm
- [nsp-sec] ajax.whitehat.cc botnet
Fronenbroek, Kick
- [nsp-sec] 37K+ Host Grum Botnet
Jason Gardiner
- [nsp-sec] Linux webserver botnet
Stephen Gill
- [nsp-sec] Linux webserver botnet
Stephen Gill
- [nsp-sec] Linux webserver botnet
Stephen Gill
- [nsp-sec] 37K+ Host Grum Botnet
Stephen Gill
- [nsp-sec] 37K+ Host Grum Botnet
Stephen Gill
- [nsp-sec] AS31708
Stephen Gill
- [nsp-sec] ATTN Qwest/Akamai....Re: More compromised ftp accounts
Patrick W. Gilmore
- [nsp-sec] 48 hour vetting: Rob Shakir (GXN, AS5413)
Patrick W. Gilmore
- [nsp-sec] China Telecom to the wcp, please!
Gong, Yiming
- [nsp-sec] ACK 2828 KR DDoS C2 machines - 20090915
Gong, Yiming
- [nsp-sec] ACK: RE: 37K+ Host Grum Botnet
Greenberg, David A
- [nsp-sec] [ACK 8928] 37K+ Host Grum Botnet
Mike Hellers
- [nsp-sec] 48 hour vetting: Rob Shakir (GXN, AS5413)
Mike Hughes
- [nsp-sec] More compromised ftp accounts
Thomas Hungenberg
- [nsp-sec] Some more compromised ftp accounts
Thomas Hungenberg
- [nsp-sec] Linux webserver botnet
Thomas Hungenberg
- [nsp-sec] Linux webserver botnet
Thomas Hungenberg
- [nsp-sec] Linux webserver botnet
Thomas Hungenberg
- [nsp-sec] Koobface C&Cs
Thomas Hungenberg
- [nsp-sec] Koobface C&Cs
Thomas Hungenberg
- [nsp-sec] ACK 174 RE: Linux webserver botnet
Nicholas Ianelli
- [nsp-sec] ACK 174 RE: Linux webserver botnet
Nicholas Ianelli
- [nsp-sec] KR DDoS C2 machines - 20090915
Nicholas Ianelli
- [nsp-sec] mariposa botnet drones
Nicholas Ianelli
- [nsp-sec] ajax.whitehat.cc botnet
Gabriel Iovino
- [nsp-sec] More compromised ftp accounts
Gabriel Iovino
- [nsp-sec] Credential dropbox at AS 5413 ??
Gabriel Iovino
- [nsp-sec] Credential dropbox at AS 5413 ??
Gabriel Iovino
- [nsp-sec] Question about potentially compromised email credentials
Gabriel Iovino
- [nsp-sec] Potentially compromised email credentials
Gabriel Iovino
- [nsp-sec] *new* 09/22/2009 - Potentially compromised email credentials
Gabriel Iovino
- [nsp-sec] Credential dropbox at AS 5413 ??
Gabriel Iovino
- [nsp-sec] 37K+ Host Grum Botnet
Gabriel Iovino
- [nsp-sec] 37K+ Host Grum Botnet
Gabriel Iovino
- [nsp-sec] 37K+ Host Grum Botnet - ack 6079 and 27506
Chris Jackman
- [nsp-sec] SSH scan from a navy.mil contractor site ?
Kurt Jaeger
- [nsp-sec] ATT Bell
Zane Jarvis
- [nsp-sec] ACK - Potentially compromised email credentials
Zane Jarvis
- [nsp-sec] ACK - Koobface C&Cs
Zane Jarvis
- [nsp-sec] Multi ACK - 37K+ Host Grum Botnet
Zane Jarvis
- [nsp-sec] Senate hearing yesterday
Rodney Joffe
- [nsp-sec] UPC NL & iBurst Phising - (Hosted in AS3595)
Stijn Jonker
- [nsp-sec] UPC NL & iBurst Phising - (Hosted in AS3595)
Stijn Jonker
- [nsp-sec] ACK: 37K+ Host Grum Botnet
Huopio Kauto
- [nsp-sec] ACK 1759 5515 Re: 37K+ Host Grum Botnet
Arttu Lehmuskallio
- [nsp-sec] More compromised ftp accounts
Jon Lewis
- [nsp-sec] ACK 15659: 37K+ Host Grum Botnet
Andreas Lorentzen
- [nsp-sec] ACK 15659: mariposa botnet drones
Andreas Lorentzen
- [nsp-sec] ACK: More compromised ftp accounts
Robert Lowe
- [nsp-sec] 48 hour vetting: Rob Shakir (GXN, AS5413)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Mike Acker (Internap, AS(see list))
Scott A. McIntyre
- [nsp-sec] 2009 Infrastructure Security Survey
Danny McPherson
- [nsp-sec] ACK Re: Linux webserver botnet
Taka Mizuguchi
- [nsp-sec] Daily Reports Summary for week ending 2009-09-07
Dave Monnier
- [nsp-sec] Google Safe Browsing and details about AS level listings
Peter Moody
- [nsp-sec] Google Safe Browsing and details about AS level listings
Peter Moody
- [nsp-sec] Google Safe Browsing and details about AS level listings
Peter Moody
- [nsp-sec] Google Safe Browsing and details about AS level listings
Peter Moody
- [nsp-sec] *new* 09/22/2009 - Potentially compromised email credentials
Peter Moody
- [nsp-sec] Numerous 1 Gbps DDOS attacks
Bruce Morgan
- [nsp-sec] Numerous 1 Gbps DDOS attacks
Bruce Morgan
- [nsp-sec] CANTV poc?
Chris Morrow
- [nsp-sec] CANTV poc?
Chris Morrow
- [nsp-sec] Numerous 1 Gbps DDOS attacks
Chris Morrow
- [nsp-sec] Bell.ca fast flux phish - looks mitigated
Jose Nazario
- [nsp-sec] Fast Fluxing Phish Nameservers
Jose Nazario
- [nsp-sec] ATTN Qwest/Akamai....Re: More compromised ftp accounts
Jose Nazario
- [nsp-sec] DoS Earlier Today
Jose Nazario
- [nsp-sec] Chaseonline phising - collector in Isreal (192.114.31.26)
Hank Nussbacher
- [nsp-sec] Chaseonline phising - collector in Isreal (192.114.31.26)
Hank Nussbacher
- [nsp-sec] Chaseonline phising - collector in Isreal (192.114.31.26)
Hank Nussbacher
- [nsp-sec] ACK More compromised ftp accounts
Zoe O'Connell
- [nsp-sec] Google Safe Browsing and details about AS level listings
Zoe O'Connell
- [nsp-sec] Google Safe Browsing and details about AS level listings
Zoe O'Connell
- [nsp-sec] 48 hour vetting: Mike Acker (Internap, AS(see list))
Steven Orchard
- [nsp-sec] ddos against 83.171.11.27-28
Niels den Otter
- [nsp-sec] ddos against 83.171.11.27-28
Niels den Otter
- [nsp-sec] ACK 14745 -- Re: 37K+ Host Grum Botnet
Mike Palladino
- [nsp-sec] Linux webserver botnet
SURFcert - Peter
- [nsp-sec] 48 hour vetting: Rob Shakir (GXN, AS5413)
David Reader
- [nsp-sec] ACK 13037 Re: 37K+ Host Grum Botnet
David Reader
- [nsp-sec] ack 13037 Re: mariposa botnet drones
David Reader
- [nsp-sec] Google Safe Browsing and details about AS level listings
Joel Rosenblatt
- [nsp-sec] Chaseonline phising - collector in Isreal (192.114.31.26)
Joel Rosenblatt
- [nsp-sec] ACK AS14 -> Re: 37K+ Host Grum Botnet
Joel Rosenblatt
- [nsp-sec] ACK AN14 -> Re: mariposa botnet drones
Joel Rosenblatt
- [nsp-sec] ACK AS3356 Re: Some more compromised ftp accounts
David Rossbach
- [nsp-sec] ACK 719 790 Re: 37K+ Host Grum Botnet
Tolvanen Saku
- [nsp-sec] China Telecom to the wcp, please!
Schiller, Heather A (HeatherSkanks)
- [nsp-sec] ACK 26496 - RE: More compromised ftp accounts
Greg Schwimer
- [nsp-sec] ACK 26496 - compromised ftp accounts 20090804
Greg Schwimer
- [nsp-sec] ACK 26496 - RE: Koobface C&Cs
Greg Schwimer
- [nsp-sec] ACK 26496 (again) Re: Koobface C&Cs
Greg Schwimer
- [nsp-sec] [ACK - AS5413] 37K+ Host Grum Botnet
Rob Shakir
- [nsp-sec] SSH scan from a navy.mil contractor site ?
Sheldon, Mike E.
- [nsp-sec] ACK 174 RE: More compromised ftp accounts
Shelton, Steve
- [nsp-sec] Attn: AS9394 | 61.235.117.83 - Koobface worm [Effecting Facebook & MySpace]
Shelton, Steve
- [nsp-sec] ACK 174 RE: Linux webserver botnet
Shelton, Steve
- [nsp-sec] ACK 174 RE: Linux webserver botnet
Shelton, Steve
- [nsp-sec] Linux webserver botnet
Shelton, Steve
- [nsp-sec] ACK 174 RE: Koobface C&Cs
Shelton, Steve
- [nsp-sec] ACK 174 RE: 37K+ Host Grum Botnet
Shelton, Steve
- [nsp-sec] 2009 Infrastructure Security Survey
Smith, Donald
- [nsp-sec] ACK 71: 37K+ Host Grum Botnet
Helmut Springer
- [nsp-sec] twitter
Christoph Sprongl
- [nsp-sec] Credential dropbox at AS 5413 ??
Christoph Sprongl
- [nsp-sec] Question about potentially compromised email credentials
Christoph Sprongl
- [nsp-sec] ajax.whitehat.cc botnet
Dirk Stander
- [nsp-sec] More compromised ftp accounts
Dirk Stander
- [nsp-sec] Some more compromised ftp accounts
Dirk Stander
- [nsp-sec] Koobface C&Cs
Dirk Stander
- [nsp-sec] 37K+ Host Grum Botnet
Dirk Stander
- [nsp-sec] mariposa botnet drones
Dirk Stander
- [nsp-sec] ACK 2914 Re: Koobface C&Cs
Tino Steward
- [nsp-sec] ACK 2914 Re: 37K+ Host Grum Botnet
Tino Steward
- [nsp-sec] Contact information
Thomas Stridh
- [nsp-sec] Botnetserver in AS7097 + local root exploit
Rune Sydskjør
- [nsp-sec] Cisco Security Advisory: TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Object-group Access Control List Bypass Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Authentication Proxy Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco Unified Communications Manager Express Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software H.323 Denial of Service Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Zone-Based Policy Firewall Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Internet Key Exchange Resource Exhaustion Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Network Time Protocol Packet Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Crafted Encryption Packet Denial of Service Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Tunnels Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] 37K+ Host Grum Botnet
Jonas Thambert
- [nsp-sec] UPC NL & iBurst Phising - (Hosted in AS3595)
Rob Thomas
- [nsp-sec] Credential dropbox at AS 5413 ??
Rob Thomas
- [nsp-sec] Credential dropbox at AS 5413 ??
Rob Thomas
- [nsp-sec] DoS Earlier Today
Rob Thomas
- [nsp-sec] ddos against 83.171.11.27-28
Marius Urkis
- [nsp-sec] ddos against 83.171.11.27-28
Marius Urkis
- [nsp-sec] ddos against 83.171.11.27-28
Marius Urkis
- [nsp-sec] ajax.whitehat.cc botnet - ACK 855
White, Gerard
- [nsp-sec] ATT Bell - ACK
White, Gerard
- [nsp-sec] ajax.whitehat.cc botnet
Tim Wilde
- [nsp-sec] Fast Fluxing Phish Nameservers
Tim Wilde
- [nsp-sec] Upcoming NSP-SEC IRC Partial Outage
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2009-09-14
Tim Wilde
- [nsp-sec] NSP-SEC IRC Half Outage Commencing
Tim Wilde
- [nsp-sec] NSP-SEC IRC Half Outage Commencing
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2009-09-21
Tim Wilde
- [nsp-sec] Help with adultfriendfinder.com affiliate ID?
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2009-09-28
Tim Wilde
- [nsp-sec] Contact needed at Worldcall Telecom in Pakistan
Tim Wilde
- [nsp-sec] Anybody from SoftLayer on here?
Bill Woodcock
- [nsp-sec] twitter
Bill Woodcock
- [nsp-sec] mariposa botnet drones
ath
- [nsp-sec] 37K+ Host Grum Botnet - ACK 2856
graeme.shinnie at bt.com
- [nsp-sec] Anybody from SoftLayer on here?
m.campisano at comcast.net
- [nsp-sec] ACK: 37K+ Host Grum Botnet
Craig.Howell at cox.com
- [nsp-sec] China Telecom to the wcp, please!
morrowc
- [nsp-sec] Paging SoftLayer Technologies
nspsec at netelder.com
- [nsp-sec] Google Safe Browsing and details about AS level listings
sthaug at nethelp.no
- [nsp-sec] Google Safe Browsing and details about AS level listings
sthaug at nethelp.no
- [nsp-sec] ack 2119, 8434, 8786 37K+ Host Grum Botnet
bjorn.jensen at telenor.com
- [nsp-sec] Possible DoS test / FYSA
Matthew.Swaar at us-cert.gov
- [nsp-sec] ACK RE: Potentially compromised email credentials
Matthew.Swaar at us-cert.gov
- [nsp-sec] ACK RE: *new* 09/22/2009 - Potentially compromised emailcredentials
Matthew.Swaar at us-cert.gov
- [nsp-sec] FYI RE: *new* 09/22/2009 - Potentially compromised emailcredentials
Matthew.Swaar at us-cert.gov
- [nsp-sec] ACK RE: 37K+ Host Grum Botnet
Matthew.Swaar at us-cert.gov
- [nsp-sec] DoS Earlier Today
Matthew.Swaar at us-cert.gov
- [nsp-sec] DoS Earlier Today
Matthew.Swaar at us-cert.gov
- [nsp-sec] DoS Earlier Today
Matthew.Swaar at us-cert.gov
Last message date:
Wed Sep 30 12:29:31 EDT 2009
Archived on: Thu Jan 22 18:52:09 EST 2015
This archive was generated by
Pipermail 0.09 (Mailman edition).