Security blocking question

Aflatoon Aflatooni aaflatooni at yahoo.com
Fri Oct 9 22:38:37 UTC 2009





----- Original Message ----
> From: Gary Gatten <Ggatten at waddell.com>
> To: Adam Vande More <amvandemore at gmail.com>; Aflatoon Aflatooni <aaflatooni at yahoo.com>
> Cc: freebsd-questions at freebsd.org
> Sent: Fri, October 9, 2009 5:53:10 PM
> Subject: RE: Security blocking question
> 
> I might also add, if it's only a handful that have legitimate access
> requirements, maybe black hole all ip's from locations (countries, etc.)
> they'll never be in.  We see a lot of bad traffic from well, certain
> countries and we simply null route them.  Or if I feel like playing a
> bit I'll route them to a tar-pit and honey pot just to see what they do.
> Pretty entertaining sometimes! :)
> 
> 

My experience has been that honeypot is good to catch internal hackers. 
I have also noticed that we get dictionary attacks from zombies in North America. I have managed to capture a Perl script that they use and it just retransmits the command from the IP of the server that have the Perl script installed.


      


More information about the freebsd-questions mailing list