Security Incidents: by date

180 messages starting Feb 02 03 and ending Feb 27 03
Date index | Thread index | Author index


Sunday, 02 February

RE: Packets from 255.255.255.255(80) (was: Packet from port 80 with spoofed microsoft.com ip) David Gillett
Re: Packet from port 80 with spoofed microsoft.com ip Pat Wilson
Re: Packet from port 80 with spoofed microsoft.com ip Hulio Cortez
The Spread of the Sapphire/Slammer Worm Nicholas Weaver
ZOMBIES_HTTP_GET Kee Hinckley
Re: /sumthin Revisited H D Moore

Monday, 03 February

Re: Packets from 255.255.255.255(80) Guy Reisenauer
RE: Packets from 255.255.255.255(80) (was: Packet from port 80 with spoofed microsoft.com ip) Joel Tyson
Re: Packets from 255.255.255.255(80) (was: Packet from port 80 with spoofed microsoft.com ip) Geert Kiers

Tuesday, 04 February

DoS Attacks, Detecting the Source, and Service Providers Hamid
Re: Packet from port 80 with spoofed microsoft.com ip zmajd fully
Re: DoS Attacks, Detecting the Source, and Service Providers james
RE: FTP/Port 1038 Boyan Krosnov

Wednesday, 05 February

RE: Packets from 255.255.255.255(80) (was: Packet from port 80 wi th spoofed microsoft.com ip) Tom Arseneault
Re: Packets from 255.255.255.255(80) (was: Packet from port 80 with spoofed microsoft.com ip) Hugo van der Kooij
Re: Packets from 255.255.255.255(80) (was: Packet from port 80 with spoofed microsoft.com ip) Frederic Harster
Re: Packets from 255.255.255.255(80) (was: Packet from port 80 with spoofed microsoft.com ip) Christian Vogel
FTP/Port 1038 Hoof Hearted
RE: DoS Attacks, Detecting the Source, and Service Providers Rob Shein
Re: DoS Attacks, Detecting the Source, and Service Providers H C
RE: Packets from 255.255.255.255(80) (was: Packet from port 80 wi th spoofed microsoft.com ip) Fitzgerald, John
RE: Packets from 255.255.255.255(80) (was: Packet from port 80 with spoofed microsoft.com ip) James Kelly
Re: Speedera Ping, was "Packets from 255.255.255.255(80), etc." Joe Stewart
RE: Packets from 255.255.255.255(80) (was: Packet from port 80 wi th spoofed microsoft.com ip) Fitzgerald, John
Speedera Ping, was "Packets from 255.255.255.255(80), etc." Neil Dickey
Re: Packets from 255.255.255.255(80) (was: Packet from port 80 with spoofed microsoft.com ip) Valdis . Kletnieks
Re: Packets from 255.255.255.255(80) (was: Packet from port 80 with spoofed microsoft.com ip) Meritt James
email address probes Andy Bastien

Thursday, 06 February

Re: email address probes Kee Hinckley
Re: email address probes Brad Arlt
Re: email address probes Greg A. Woods
RE: email address probes Johann Kruse
Re: email address probes Dave Laird
Re: email address probes Ned Fleming
Re: email address probes Axel Beckert - ecos gmbh
Netbios Name Scans/opaserv worm rocky_scotti
Re: email address probes james
ALEVRIUS! Geert Kiers
Re: Netbios Name Scans/opaserv worm H C

Friday, 07 February

Re: FW: Packets from 255.255.255.255(80) (was: Packet from port 80 wi th spoofed microsoft.com ip) Alif The Terrible
RE: ALEVRIUS! Rob Shein
Re: email address probes Brad Arlt
Re: email address probes Andy Bastien
RE: ALEVRIUS! James C Slora Jr
RE: email address probes Rob Shein
RE: ALEVRIUS! Anders Reed Mohn
RE: ALEVRIUS! Salisko, Rick

Monday, 10 February

RE: ALEVRIUS! NetSec Analyst
Kuang2 on the rise... Jeff Kell
Increased Kuang2 activity Jason Dixon
Suspicious file on Desktop Patrick Fish
RE: Increased Kuang2 activity Logan F.D. Greenlee
Re: Increased Kuang2 activity Johannes Ullrich
RE: Suspicious file on Desktop Eric Greenberg
RE: Increased Kuang2 activity Jason Dixon
RE: Suspicious file on Desktop Michael LaSalvia
RE: Increased Kuang2 activity Rev. Kronovohr
RE: Increased Kuang2 activity Jennifer Fountain
RE: Increased Kuang2 activity davec
Re: Suspicious file on Desktop PAUL_TAYLOR
RE: Increased Kuang2 activity Logan F.D. Greenlee
RE: Increased Kuang2 activity Baklarz, Ron
RE: Increased Kuang2 activity James C Slora Jr
RE: Suspicious file on Desktop Brenna Primrose
Correction: www.ethereal.com not www.ethereal.org RE: Suspicious file on Desktop Eric Greenberg
RE: Increased Kuang2 activity James C Slora Jr
Identity theft scam against eBay users Patrick Bryant
Re: Increased Kuang2 activity Kurt Seifried
Re: Identity theft scam against eBay users Jordan K Wiens
Re: Identity theft scam against eBay users Matthew Breitenstine
RE: Increased Kuang2 activity Thierry Zoller
logfiles of openssl-0.9.6e + GET_CLIENT_HELLO exploit... Chuck Swiger
Re: Identity theft scam against eBay users Patrick Bryant

Tuesday, 11 February

Re: Identity theft scam against eBay users Nick FitzGerald
Re: Identity theft scam against eBay users Thomas Giudice
Traffic on UDP 1815 Sahr, Kenneth
RE: ALEVRIUS! Anders Reed Mohn
Re: Identity theft scam against eBay users Patrick Bryant
Re: logfiles of openssl-0.9.6e + GET_CLIENT_HELLO exploit... Richard Rager

Wednesday, 12 February

Re: logfiles of openssl-0.9.6e + GET_CLIENT_HELLO exploit... root@darks
Re: logfiles of openssl-0.9.6e + GET_CLIENT_HELLO exploit... jet
Re: logfiles of openssl-0.9.6e + GET_CLIENT_HELLO exploit... Chuck Swiger
RE: Traffic on UDP 1815 Sahr, Kenneth
RE: Traffic on UDP 1815 Mark E. Donaldson
The 4 line ad at the bottom of this post.. Alfred Huger
ftp server compromised rbelchez
RE: ftp server compromised Mark E. Donaldson
Re: ftp server compromised Tibor Biro
Re: ftp server compromised David Hodges

Thursday, 13 February

RE: ftp server compromised Denis Dimick
Re: ftp server compromised psion
webserver probes for php detection Alexander Reelsen
S4T4N1C Web Defacement Christopher Lyon
UDP traffic on Port 52798 Kenneth Wilson
Re: S4T4N1C Web Defacement Michel Angelo da Silva Pereira
Re: UDP traffic on Port 52798 H C
Re: S4T4N1C Web Defacement HggdH
RE: FTP/Port 1038 perrieror
RE: S4T4N1C Web Defacement Dan Perez
Summary of the responses (4 line ad) Alfred Huger
ICMP Destination Unreachable, Administratively Prohibited Neil Dickey
Re: S4T4N1C Web Defacement Michel Angelo da Silva Pereira
Re: ICMP Destination Unreachable, Administratively Prohibited Chris Brenton
Re: ICMP Destination Unreachable, Administratively Prohibited Russell Fulton

Friday, 14 February

Re: ICMP Destination Unreachable, Administratively Prohibited Anders Thulin
Spies on Your PC HDrv Mr . Day
Re: Web Defacement Ricardo Castanho de Oliveira Freitas
Re: S4T4N1C Web Defacement security
Re: ICMP Destination Unreachable, Administratively Prohibited Anthony Kim
Re: ICMP Destination Unreachable, Administratively Prohibited Valdis . Kletnieks

Saturday, 15 February

Incidents list administrivia and introductions... Dan Hanson
Kuang2 strikes again, is it just me? Jeff Kell

Sunday, 16 February

RE: Kuang2 strikes again, is it just me? Rob Shein
Re: Kuang2 strikes again, is it just me? Johannes Ullrich
Re: Kuang2 strikes again, is it just me? Jasmine
Re: Kuang2 strikes again, is it just me? Jeff
Re: ano () ano com ftpd dip.t-dialin.net Scott Harris
RE: Kuang2 strikes again, is it just me? Trevor Metzger

Monday, 17 February

mIRC Trojan Variant - port 445 worm/Trojan kyle
RE: Kuang2 strikes again, is it just me? Tim Heagarty
www.nopop.net Pascal Bouchareine
Re: Web Defacement Alberto Cozer
Re: Kuang2 strikes again, is it just me? Paul Dokas
RE: www.nopop.net Brad Griffin
Re: www.nopop.net Jon Rublack
Distributed spam-based DoS in progress Transistor Sister

Tuesday, 18 February

port 17300 probe fingerprint analysis Royans Tharakan
Re: port 17300 probe fingerprint analysis John Sage
Re: Distributed spam-based DoS in progress Hugo van der Kooij
Re: Kuang2 strikes again, is it just me? Kevin Patz
RE: Distributed spam-based DoS in progress Dave Hart
Re: Distributed spam-based DoS in progress Valdis . Kletnieks

Wednesday, 19 February

Re: Distributed spam-based DoS in progress Kee Hinckley
Re: Distributed spam-based DoS in progress Transistor Sister
RE: Distributed spam-based DoS in progress Hugo van der Kooij
Re: port 17300 probe fingerprint analysis william . miller
RE: Distributed spam-based DoS in progress Dave Hart
RE: Distributed spam-based DoS in progress Steve Drees
Dead thread -- Distributed spam-based DoS in progress Dan Hanson

Thursday, 20 February

Weird Profile in Documents and Settings Greg Wiedeman
Re: Distributed spam-based DoS in progress Rohan Amin
RE: Weird Profile in Documents and Settings Rob Shein
Scans on TCP port 135 Kevin Patz

Friday, 21 February

RE: Weird Profile in Documents and Settings Lucas Zaichkowsky
Re: Weird Profile in Documents and Settings Anders Thulin
Possible stateful filtering problem? Security
WebJob 1.2.3 Released Klayton Monroe
FTimes 3.2.0 Released Klayton Monroe
Questions: LKM, yoyo & rootkits Gordon Ewasiuk
Re: Weird Profile in Documents and Settings Gene Yoo
ICQ problem. Thiago Madeira de Lima
Re[2]: Weird Profile in Documents and Settings Jyri Hovila
Possible new backdoor: mspx-smss.exe ? Sven Pechler
Re: Scans on TCP port 135 Dave Aitel
Re: Weird Profile in Documents and Settings Patrick R. Sweeney
Re: ICQ problem. bob
RE: Weird Profile in Documents and Settings Austin Ehlers

Saturday, 22 February

RE: Weird Profile in Documents and Settings Christopher Hummert

Sunday, 23 February

Weird Windows logon attempts Harry Hoffman

Monday, 24 February

Re: Weird Windows logon attempts Jacco Tunnissen
Re: Weird Windows logon attempts Bojan Zdrnja
RE: Weird Windows logon attempts Terence Runge
Web server crashed, now is trying to contact an IP by port 80 every morning. Dan Harpold
Re: ICQ problem. Rafael Coninck Teigao

Tuesday, 25 February

Re: Web server crashed, now is trying to contact an IP by port 80 every morning. lsi
RE: Web server crashed, now is trying to contact an IP by port 80 every morning. Dan Harpold
RE: Web server crashed, now is trying to contact an IP by port 80 every morning. Levinson, Karl
Re: Weird Windows logon attempts H C
Incident Focus Area Article Announcement Dan Hanson

Wednesday, 26 February

Re: Weird Windows logon attempts Russell Fulton
Remote Access Software (Wireless Devices) Holstein, Michael
Weird apache logs Travis Read
RE: Weird apache logs Carmen Tache
RE: Weird apache logs NESTING, DAVID M (SBCSI)
Re: More /sumthin Philipp Hug
RE: More /sumthin Jonathan A. Zdziarski
RE: Weird Windows logon attempts Mary McAllister

Thursday, 27 February

Re: More /sumthin D.C. van Moolenbroek
Interesting http-equiv () excite com
Re: Possible new backdoor: mspx-smss.exe ? Sven Pechler