report it ............

attached is a nice script you may be able to use ......   *use at own risk*




*********** REPLY SEPARATOR  ***********

On 23/01/00 at 21:01 Steve wrote:

>Well, I'd like to start off by thanking each and every one of you on this
list
>for the help setting up ipchains and making me aware of  portsentry and
>logcheck as I have effortlessly survived my first potential attack. I woke
up
>this morning and headed upstate to the computer show not bothering to
check my
>email. When I returned I had an email from logcheck telling be that
portsentry
>had dumped a potential hacker into the bit bucket. I am sure most of you
who
>have had the pleasure of receiving such an email know the joy I felt at
that
>moment. Now I need some advice as to what I do next. Should I check any
other
>logs to make sure he didn't get in? Should I report the incident to his
local
>ISP. What steps do I take next?
>
>Thank you all again for the help!
>Steve
>
>
>BTW: Here is what I got from logcheck:
>
>Active System Attack Alerts
>=-=-=-=-=-=-=-=-=-=-=-=-=-=
>Jan 23 08:11:17 localhost portsentry[587]: attackalert: Connect from host:
1Cust249.tnt20.chi5.da.uu.net/63.20.110.249 to UDP port: 31337
>Jan 23 08:11:17 localhost portsentry[587]: attackalert: Host 63.20.110.249
has been blocked via wrappers with string: "ALL: 63.20.110.249"
>Jan 23 08:11:17 localhost portsentry[587]: attackalert: Host 63.20.110.249
has been blocked via dropped route using command: "/sbin/ipchains -I input
-s 63.20.110.249 -j DENY -l"


Regards

Greg Wright
IT Consultant Sydney Australia

-- 

*** Please trim any replies ***
*** Please turn off HTML in your email ***
*** Please don't use the list for test messages ***
*** Why not read the archives? http://moongroup.com/redhat.phtml ***


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to