[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [cobalt-users] OT Hosting company scanning my Cobalt
- Subject: RE: [cobalt-users] OT Hosting company scanning my Cobalt
- From: "Dan Kriwitsky" <list1@xxxxxxxxxxxxxxxxxxxx>
- Date: Fri Aug 16 09:25:03 2002
- List-id: Mailing list for users to share thoughts on Sun Cobalt products. <cobalt-users.list.cobalt.com>
> "1.-(1) A person is guilty of an offence if-
> (a) he causes a computer to perform any function with intent
> to secure access to any program or data held in any computer;
> (b) the access he intends to secure is unauthorised; and
> (c) he knows at the time when he causes the computer to
> perform the function that that is the case."
>
Since a portscan tool doesn't actually gain access and only shows the
port is open, I doubt the port scan itself would be considered "intent
to secure access".
BTW, speaking of illegal access: if anyone is grepping their access
files, look for "w00t". It's a formmail hack attempt and reveals the
email address the spammer is using to receive the output of a broken
formmail. e.g.,
www.airports.worldsbestdeals.com 24-168-45-54.nyc.rr.com - -
[16/Aug/2002:08:54:09 -0500] "GET
/cgi-bin/formmail.pl?email=f2%40aol%2Ecom&subject=airports%2Eworldsbestd
eals%2Ecom%2Fcgi%2Dbin%2Fformmail%2Epl&recipient=tcatenaccio%40mail%2Eco
m&msg=w00t HTTP/1.1Content-Type: application/x-www-form-urlencoded" 200
1628 "-" "Gozilla/4.0 (compatible; MSIE 5.5; windows 2000)"
Note: f2@xxxxxxx is just the decoy. tcatenaccio@xxxxxxxx is the actual
intented recipient of the info.
--
Dan Kriwitsky
Please reply to the list only. Offlist replies are not read.