Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. "Asia Pacific Network Information Centre"

"Asia Pacific Network Information Centre"

Scheduled Pinned Locked Moved The Lounge
sysadmincomquestionlearning
14 Posts 8 Posters 5 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • L Lost User

    RIPE NCC isn't doing that. The reverse DNS is wrong, as usual.

    L Offline
    L Offline
    LloydA111
    wrote on last edited by
    #5

    Oh right :sigh:


    See if you can crack this: b749f6c269a746243debc6488046e33f
    So far, no one seems to have cracked this!

    The unofficial awesome history of Code Project's Bob! "People demand freedom of speech to make up for the freedom of thought which they avoid."

    1 Reply Last reply
    0
    • L LloydA111

      One of my internet connected servers keeps getting RDP login attempts from an IP address, which according to a whois lookup, belongs to some company in Australia I have never heard of. The login attempts are now numbering in the hundreds. Another very worrying IP address that has been trying to login to the server belongs to "RIPE Network Coordination Centre". After a search on the internet, this company is described as "The RIPE NCC is one of five Regional Internet Registries (RIRs) providing Internet resource allocations, registration services and coordination activities that support the operation of the Internet globally." Why would a company like this be trying to login to my server? Edit: In total, the number of failed login attempts by various IP addresses is: 14402 :wtf: What's going on?!


      See if you can crack this: b749f6c269a746243debc6488046e33f
      So far, no one seems to have cracked this!

      The unofficial awesome history of Code Project's Bob! "People demand freedom of speech to make up for the freedom of thought which they avoid."

      V Offline
      V Offline
      Vasudevan Deepak Kumar
      wrote on last edited by
      #6

      The IP address can be spoofed right?

      Vasudevan Deepak Kumar Personal Homepage
      Tech Gossips
      The woods are lovely, dark and deep, But I have promises to keep, And miles to go before I sleep, And miles to go before I sleep!

      D 1 Reply Last reply
      0
      • L LloydA111

        One of my internet connected servers keeps getting RDP login attempts from an IP address, which according to a whois lookup, belongs to some company in Australia I have never heard of. The login attempts are now numbering in the hundreds. Another very worrying IP address that has been trying to login to the server belongs to "RIPE Network Coordination Centre". After a search on the internet, this company is described as "The RIPE NCC is one of five Regional Internet Registries (RIRs) providing Internet resource allocations, registration services and coordination activities that support the operation of the Internet globally." Why would a company like this be trying to login to my server? Edit: In total, the number of failed login attempts by various IP addresses is: 14402 :wtf: What's going on?!


        See if you can crack this: b749f6c269a746243debc6488046e33f
        So far, no one seems to have cracked this!

        The unofficial awesome history of Code Project's Bob! "People demand freedom of speech to make up for the freedom of thought which they avoid."

        A Offline
        A Offline
        AspDotNetDev
        wrote on last edited by
        #7

        They're probably trying to brute force a password. Hopefully you picked a really strong one. :~ Maybe you can block that IP address.

        Thou mewling ill-breeding pignut!

        L 1 Reply Last reply
        0
        • L LloydA111

          One of my internet connected servers keeps getting RDP login attempts from an IP address, which according to a whois lookup, belongs to some company in Australia I have never heard of. The login attempts are now numbering in the hundreds. Another very worrying IP address that has been trying to login to the server belongs to "RIPE Network Coordination Centre". After a search on the internet, this company is described as "The RIPE NCC is one of five Regional Internet Registries (RIRs) providing Internet resource allocations, registration services and coordination activities that support the operation of the Internet globally." Why would a company like this be trying to login to my server? Edit: In total, the number of failed login attempts by various IP addresses is: 14402 :wtf: What's going on?!


          See if you can crack this: b749f6c269a746243debc6488046e33f
          So far, no one seems to have cracked this!

          The unofficial awesome history of Code Project's Bob! "People demand freedom of speech to make up for the freedom of thought which they avoid."

          J Offline
          J Offline
          Jason Hooper
          wrote on last edited by
          #8

          Hopefully you and the rest of us are aware of this[^] by now?

          Jason

          V 1 Reply Last reply
          0
          • A AspDotNetDev

            They're probably trying to brute force a password. Hopefully you picked a really strong one. :~ Maybe you can block that IP address.

            Thou mewling ill-breeding pignut!

            L Offline
            L Offline
            LloydA111
            wrote on last edited by
            #9

            It was a reasonably strong password before, but just in case, I've made a new password that is 17 characters long.


            See if you can crack this: b749f6c269a746243debc6488046e33f
            So far, no one seems to have cracked this!

            The unofficial awesome history of Code Project's Bob! "People demand freedom of speech to make up for the freedom of thought which they avoid."

            A 1 Reply Last reply
            0
            • J Jason Hooper

              Hopefully you and the rest of us are aware of this[^] by now?

              Jason

              V Offline
              V Offline
              Vasudevan Deepak Kumar
              wrote on last edited by
              #10

              Buffer overflows, Security Exploits -- these seem to be some of the buzz words frequently appearing in Microsoft security bulletins and patches. I am wondering if this is Microsoft strategy to maintain jobs for their section of employees by retaining and injecting bugs? Can't they deliver one piece of code which is free of such unit-testing category bugs that even my dog will not miss?

              Vasudevan Deepak Kumar Personal Homepage
              Tech Gossips
              The woods are lovely, dark and deep, But I have promises to keep, And miles to go before I sleep, And miles to go before I sleep!

              D 1 Reply Last reply
              0
              • L LloydA111

                It was a reasonably strong password before, but just in case, I've made a new password that is 17 characters long.


                See if you can crack this: b749f6c269a746243debc6488046e33f
                So far, no one seems to have cracked this!

                The unofficial awesome history of Code Project's Bob! "People demand freedom of speech to make up for the freedom of thought which they avoid."

                A Offline
                A Offline
                AspDotNetDev
                wrote on last edited by
                #11

                17 characters, eh? Thanks for letting me know the exact length. I can now save a little time by not checking any other length.

                Thou mewling ill-breeding pignut!

                realJSOPR 1 Reply Last reply
                0
                • A AspDotNetDev

                  17 characters, eh? Thanks for letting me know the exact length. I can now save a little time by not checking any other length.

                  Thou mewling ill-breeding pignut!

                  realJSOPR Offline
                  realJSOPR Offline
                  realJSOP
                  wrote on last edited by
                  #12

                  I bet you can sell that info for a pretty penny to someone at APNIC... :)

                  ".45 ACP - because shooting twice is just silly" - JSOP, 2010
                  -----
                  You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
                  -----
                  "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass." - Dale Earnhardt, 1997

                  1 Reply Last reply
                  0
                  • V Vasudevan Deepak Kumar

                    The IP address can be spoofed right?

                    Vasudevan Deepak Kumar Personal Homepage
                    Tech Gossips
                    The woods are lovely, dark and deep, But I have promises to keep, And miles to go before I sleep, And miles to go before I sleep!

                    D Offline
                    D Offline
                    Daniel Grunwald
                    wrote on last edited by
                    #13

                    Spoofed IPs can't complete the TCP three-way-handshake to establish a connection; so they can be only used with UDP (or for good old SYN floods).

                    1 Reply Last reply
                    0
                    • V Vasudevan Deepak Kumar

                      Buffer overflows, Security Exploits -- these seem to be some of the buzz words frequently appearing in Microsoft security bulletins and patches. I am wondering if this is Microsoft strategy to maintain jobs for their section of employees by retaining and injecting bugs? Can't they deliver one piece of code which is free of such unit-testing category bugs that even my dog will not miss?

                      Vasudevan Deepak Kumar Personal Homepage
                      Tech Gossips
                      The woods are lovely, dark and deep, But I have promises to keep, And miles to go before I sleep, And miles to go before I sleep!

                      D Offline
                      D Offline
                      Daniel Grunwald
                      wrote on last edited by
                      #14

                      You realize that almost any use of a pointer in C outside the array bounds is an exploitable buffer overflow? Even dereferencing a null pointer can be exploitable in some rare cases. It's not just restricted to the simple stack buffers you might remember seeing - in fact those simple cases are difficult or impossible to exploit due to NX and stack cookies, and they're easily detected by static code analysis. But think about more complex code as occurs when parsing complex binary file/message formats; it's extremely hard to test for all possible invalid kinds of input. You rarely have a chance of finding this type of bug without writing a protocol-specific fuzzer. And don't forget that C / C++ have tons of undefined behavior that attackers can exploit. For examples, the standard allows compilers to assume that no overflows happen with signed integers and pointer, and some C compilers have been seen optimizing away security checks because they were "always false" (except for the cases with the integer overflow, which the compiler is allowed to ignore). http://blogs.msdn.com/b/david_leblanc/archive/2008/04/04/evil-compiler-tricks-and-checking-for-pointer-math.aspx[^] I don't think we'll see a reduction in the number of security issues until the industry switches to a safer language. (this isn't a Microsoft-specific problem)

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups