Full Disclosure mailing list archives

Re: blue security folds


From: Steve Kudlak <stevex11 () sbcglobal net>
Date: Thu, 18 May 2006 15:14:52 -0700

Teenaged have always been the best things that have happened to my mnachines. I swear I have learned how to fix, find and debug more thingss via the things they havbe accidentally installed on my machines than any of the standardtext book ways/ ALso teaching them how to do tghings has really helped me keep my up and improve my skills. So I guess La Dimpulz Speed of Light Fingers is a blesing in disguise almost all of the time. Actually, a "here's what's going on, he is why it is bad and he is what you can do to help work wonders most of the time..

Mostly I blame the "you don't need to know nothing about the technology culture" we are slipping into We get old "get this network magic" power toy and it will arrange it so so you can do things with a few clicks of the mouse and not knowing anything about how anything really works. What would be nice is a tool like that with a manual that explain how thing actually work with when you do those few clicks of the mouse.

Have Fun,
Sends Steve



evilrabbi wrote:

Actually at the ISP I work for we do monitor for botnet activity. It's really not that hard to notice them either. You really have to not know anything or just not care to miss the traffic. I've cut off more then one use because of issues like. After cutting them off I'll give them a call and tell them why, offer proof, explain the proof (ie make them type ipconfig /all so they can see their mac address because it adds validity in their eyes), then I refer them to a computer store we also own. Generally they are happy that we noticed so they can get their machines cleaned up.

On 5/17/06, *Gaddis, Jeremy L.* <jeremy () linuxwiz net <mailto:jeremy () linuxwiz net>> wrote:

    nocfed wrote:
    > And if the ISP's could get their act together then most of the
    botnets
    > would be no more.  This _IS_ something that can be controlled, to an
    > extent.  Many of the network administrators need a course in
    > Networking 101 which will greatly assist in tracking down the source
    > of attacks.  If botnets are required to use their own IP's then how
    > hard would it really be to track them down and disable them?
    > Disruption of the end users connection and a flag on their account
    > should clean them up, although not 100%.  So if you want someone to
    > blame, blame the ISP, blame the hosting service, and blame the end
    > user.

    While I agree (mostly), getting the ISPs to do what you suggest will
    never happen.  If I, Joe Clueless User, have a bot running on my PC
    spamming half the world, and my ISP notices this and shuts me off,
    what
    will I do?  Assuming I'm like the majority of users and either a)
    don't
    know, or b) don't care what they're talking about, I'll cancel my
    account and switch to another ISP (that won't shut me off).  To do
    what
    you suggest would be for the greater good of the whole "Internet
    community", but would negatively affect $ISP's bottom line.  Since we
    all know they only care about themselves, well, draw your own
    conclusions...

    -j

    --
    Jeremy L. Gaddis
    GCWN, MCP, Linux+, Network+
    http://www.jeremygaddis.com/

    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.grok.org.uk/full-disclosure-charter.html
    Hosted and sponsored by Secunia - http://secunia.com/
    <http://secunia.com/>




--
-- h0 h0 h0 --
www.nopsled.net <http://www.nopsled.net>

------------------------------------------------------------------------

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: