[iwar] Interesting story

From: Fred Cohen (fc@all.net)
Date: 2001-07-31 05:30:13


Return-Path: <sentto-279987-1508-996582619-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 31 Jul 2001 05:31:07 -0700 (PDT)
Received: (qmail 10936 invoked by uid 510); 31 Jul 2001 11:32:44 -0000
Received: from n5.groups.yahoo.com (216.115.96.55) by 204.181.12.215 with SMTP; 31 Jul 2001 11:32:44 -0000
X-eGroups-Return: sentto-279987-1508-996582619-fc=all.net@returns.onelist.com
Received: from [10.1.4.56] by hl.egroups.com with NNFMP; 31 Jul 2001 12:30:19 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_2_0); 31 Jul 2001 12:30:18 -0000
Received: (qmail 32712 invoked from network); 31 Jul 2001 12:30:14 -0000
Received: from unknown (10.1.10.27) by l10.egroups.com with QMQP; 31 Jul 2001 12:30:14 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 31 Jul 2001 12:30:14 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id FAA11849 for iwar@onelist.com; Tue, 31 Jul 2001 05:30:13 -0700
Message-Id: <200107311230.FAA11849@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 31 Jul 2001 05:30:13 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] Interesting story
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Hacking activity at all-time high 
By John Leyden, The Register, 7/30/2001
http://www.theregister.co.uk/content/55/20714.html

Hacking activity is at an all-time high, according to stats compiled by
The Honeynet Project. 
It bases this conclusion on the number of attacks perpetrated against a
network of servers, set up by the organisation specifically to collect
data on hacking attempts. 
The intrusion detection system placed on the Honeynet's servers
generated 157 alerts during May 2000 but this figure had escalated by a
factor of almost nine to 1,398 alerts by February 2001. The Honeynet's
firewall showed a doubling of alerts from 103 to 206 per month between
May 2000 and February 2001. 
Much of what the project discovered chimes in with the increasing
incidents of corporate Web site defacement and other hacking attacks but
it also throws up some interesting insights in the techniques used by
black hat hackers. 
"Some black hats have streamlined their scanning process to merely look
for a specific service," the Honeynet Project said on a report on its
work, which is available here. "If they find the service, they launch
the exploit without even first determining if the system is vulnerable,
or even the correct system." 
"This aggressive approach allows black hats to scan and exploit more
systems in less time," said the report, which added the tactic of
focusing on exploiting a single vulnerability is used by many s'kiddies. 
"These numbers indicate black hat activity has continued to grow, most
likely the result of more aggressive, automated scanning tools and their
growing availability." 
...

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Secure your servers with 128-bit SSL encryption! Grab your copy of VeriSign's FREE Guide: "Securing Your Web Site for Business." Get it Now!
http://www.verisign.com/cgi-bin/go.cgi?a=n094442340008000
http://us.click.yahoo.com/n7RbFC/zhwCAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:38 PDT