Return-Path: <sentto-279987-1508-996582619-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 31 Jul 2001 05:31:07 -0700 (PDT) Received: (qmail 10936 invoked by uid 510); 31 Jul 2001 11:32:44 -0000 Received: from n5.groups.yahoo.com (216.115.96.55) by 204.181.12.215 with SMTP; 31 Jul 2001 11:32:44 -0000 X-eGroups-Return: sentto-279987-1508-996582619-fc=all.net@returns.onelist.com Received: from [10.1.4.56] by hl.egroups.com with NNFMP; 31 Jul 2001 12:30:19 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_2_0); 31 Jul 2001 12:30:18 -0000 Received: (qmail 32712 invoked from network); 31 Jul 2001 12:30:14 -0000 Received: from unknown (10.1.10.27) by l10.egroups.com with QMQP; 31 Jul 2001 12:30:14 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 31 Jul 2001 12:30:14 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id FAA11849 for iwar@onelist.com; Tue, 31 Jul 2001 05:30:13 -0700 Message-Id: <200107311230.FAA11849@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 31 Jul 2001 05:30:13 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] Interesting story Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Hacking activity at all-time high By John Leyden, The Register, 7/30/2001 http://www.theregister.co.uk/content/55/20714.html Hacking activity is at an all-time high, according to stats compiled by The Honeynet Project. It bases this conclusion on the number of attacks perpetrated against a network of servers, set up by the organisation specifically to collect data on hacking attempts. The intrusion detection system placed on the Honeynet's servers generated 157 alerts during May 2000 but this figure had escalated by a factor of almost nine to 1,398 alerts by February 2001. The Honeynet's firewall showed a doubling of alerts from 103 to 206 per month between May 2000 and February 2001. Much of what the project discovered chimes in with the increasing incidents of corporate Web site defacement and other hacking attacks but it also throws up some interesting insights in the techniques used by black hat hackers. "Some black hats have streamlined their scanning process to merely look for a specific service," the Honeynet Project said on a report on its work, which is available here. "If they find the service, they launch the exploit without even first determining if the system is vulnerable, or even the correct system." "This aggressive approach allows black hats to scan and exploit more systems in less time," said the report, which added the tactic of focusing on exploiting a single vulnerability is used by many s'kiddies. "These numbers indicate black hat activity has continued to grow, most likely the result of more aggressive, automated scanning tools and their growing availability." ... ------------------------ Yahoo! Groups Sponsor ---------------------~--> Secure your servers with 128-bit SSL encryption! Grab your copy of VeriSign's FREE Guide: "Securing Your Web Site for Business." Get it Now! http://www.verisign.com/cgi-bin/go.cgi?a=n094442340008000 http://us.click.yahoo.com/n7RbFC/zhwCAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:38 PDT