RE: Some new SSH exploit script?

From: David Ball (lostinvietnam@hotmail.com)
Date: Fri Jun 09 2006 - 04:29:02 EDT


Well a big chunk of the world's population lives in the Asia region so I
guess by the law of averages you're bound to see more of everything
happening there (here). ;) Hacking, organised crime, ice-cream sales, etc.
The high % of broadband pentration has a lot to do with it too. Doubt most
companies will get away with blocking APNIC IP space for much longer with
the amt of business coming out of Asia.

Sorry off topic but I couldn't resist. ;)

BY POPULATION 2005 est.

#1 Asia - (3,879,000,000)
#2 Africa - (877,500,000)
#3 Europe - (727,000,000)
#4 North America - (501,500,000)
#5 South America - (379,500,000)
#6 Australia/Oceania - (32,000,000)
#7 Antarctica - (0)

>Art Cooper <acooper@innerwall.com>
>No Phone Info Available
>06/09/2006 06:50 AM
>
>To
>"pen-test@securityfocus.com" <pen-test@securityfocus.com>
>cc
>
>Subject
>FW: Some new SSH exploit script?
>
>I agree about ³killing² any inbound traffic from the APNIC IP space. For
>any of you who may not know (newbies) the APNIC is the Asia Pacific
>Network
>Information Center and can be reached at: http://www.apnic.net That
>organization is attempting to keep a ³handle² on the Asia-Pacific IP
>Space,
>but unfortunately, time-after-time APNIC space is used to launch attacks.
>
>At one time, I was working for Harris Corporation, and I was managing the
>network of a large US Air Force installation. This was during the early
>days of ³SNORT². The amount of ³crapola² coming out of the APNIC IP
>Space
>was unbelievable. Once I set up a SNORT system and was able to pinpoint
>it,
>I received permission from the Base Commander to BLOCK all of the APNIC
>space ­ at least ³inbound² anyway. At one time, I think APNIC IP Space
>was
>responsible for more than 65% of the ³Internet NOISE² out there at any
>given
>time. Take a look at the Internet Storm Center over at SANS and you¹ll
>see
>what I mean: http://isc.sans.org
>
>I hate to ³pick on² the APNIC, but most of the ³government-Sponsored²
>hacking comes out of that region unfortunately. All we can do in the rest
>of the world is be aware of it and take appropriate measures.
>
>Best Regards,
>Coop
>
>Arthur B. Cooper Jr. ³COOP²
>Innerwall, Senior Network Engineer
>
>Office: (719) 264-2737‹Email: acooper@innerwall.com
>2060 Briargate Parkway, Suite 339, Colorado Springs, CO 80920
>Website: http://www.innerwall.com
>
>From: "Adam.Chesnutt" <icetre@digitalfreezer.net>
>Date: Tue, 06 Jun 2006 20:51:31 -0400
>To: Jarrod Frates <jfrates.ml@gmail.com>
>Cc: <pen-test@securityfocus.com>
>Subject: Re: Some new SSH exploit script?
>
>All,
>
>Similarly, I have a large number of hacktards trying to login as root on
>my servers.
>
>I also have no need for apnic space to talk to my servers, most of my
>legitimate requests come from the US.
>
>As such, I have a script that I wrote that I call killapnic, that goes
>out to the web, retrieves the apnic space and ipfw's all of it.
>
>I have had great success with this. While it doesn't stop the local
>hackers, it does stop 95% of the cruft that comes my way.
>
>I suppose if I could adapt my script to do both this, and nailing out 3
>bad attempts from x ip. This seems trivial.
>
>Adam
>
> > On 4 Jun 2006 00:04:15 -0000, anony@mouse.com <anony@mouse.com> wrote:
> >> I strongly disagree with changing the port sshd listens on to "solve"
> >> this attack. It is completely unnecessary.
> >
> > I've found some success with Fail2Ban, which adds in iptables rules
> > after a specified number of bad attempts, and I monitor the reports
> > for repetitive IP addresses or blocks, adding them to a permanent ban
> > list. The number of failures per day decreased from 20K+ to under 50.
> >
> >
> > Jarrod
> >
> >
>------------------------------------------------------------------------------
> >
> > This List Sponsored by: Cenzic
> >
> > Concerned about Web Application Security? Why not go with the #1
> > solution - Cenzic, the only one to win the Analyst's Choice Award from
> > eWeek. As attacks through web applications continue to rise, you need
> > to proactively protect your applications from hackers. Cenzic has the
> > most comprehensive solutions to meet your application security
> > penetration testing and vulnerability management needs. You have an
> > option to go with a managed service (Cenzic ClickToSecure) or an
> > enterprise software (Cenzic Hailstorm). Download FREE whitepaper on
> > how a managed service can help you:
> > http://www.cenzic.com/news_events/wpappsec.php And, now for a limited
> > time we can do a FREE audit for you to confirm your results from other
> > product. Contact us at request@cenzic.com for details.
> >
>------------------------------------------------------------------------------
> >
> >
>
>
>----------------------------------------------------------------------------
>--
>This List Sponsored by: Cenzic
>
>Concerned about Web Application Security?
>Why not go with the #1 solution - Cenzic, the only one to win the
>Analyst's
>Choice Award from eWeek. As attacks through web applications continue to
>rise,
>you need to proactively protect your applications from hackers. Cenzic has
>the
>most comprehensive solutions to meet your application security penetration
>testing and vulnerability management needs. You have an option to go with
>a
>managed service (Cenzic ClickToSecure) or an enterprise software
>(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
>help you: http://www.cenzic.com/news_events/wpappsec.php
>And, now for a limited time we can do a FREE audit for you to confirm your
>results from other product. Contact us at request@cenzic.com for details.
>----------------------------------------------------------------------------
>--
>
>
>
>------ End of Forwarded Message
>
>
>
>------------------------------------------------------------------------------
>This List Sponsored by: Cenzic
>
>Concerned about Web Application Security?
>Why not go with the #1 solution - Cenzic, the only one to win the
>Analyst's
>Choice Award from eWeek. As attacks through web applications continue to
>rise,
>you need to proactively protect your applications from hackers. Cenzic has
>the
>most comprehensive solutions to meet your application security penetration
>
>testing and vulnerability management needs. You have an option to go with
>a
>managed service (Cenzic ClickToSecure) or an enterprise software
>(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
>help you: http://www.cenzic.com/news_events/wpappsec.php
>And, now for a limited time we can do a FREE audit for you to confirm your
>
>results from other product. Contact us at request@cenzic.com for details.
>------------------------------------------------------------------------------
>
>

_________________________________________________________________
Learn English via Shopping Game, FREE!
http://www.linguaphonenet.com/BannerTrack.asp?EMSCode=MSN06-03ETFJ-0211E

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:04 EDT