CariDotMy

 Forgot password?
 Register

ADVERTISEMENT

View: 4828|Reply: 1

I'm seeing lots of attacks. Is this normal?

[Copy link]
Post time 8-3-2004 09:08 PM | Show all posts |Read mode
This article applies to: BlackICE Defender.

SUMMARY
Yes.

DETAILS
How often you will detect scans depends upon your connection type and how long you are connected.

cable-modems
Scanned/attacked several times per day. It depends upon the cable-modem segment you are on, but some people are getting attacked as much as 20 times per day. We believe scans are so common because hackers know that virtually all cable-modems are in the range 24.x.x.x. We suspect that those in the low range of 24.1.x.x receive more than those in higher ranges (i.e. 24.94.x.x).

DSL modems
Varies widely, some are only about once per week, others receive a couple per day. We suspect that some DSL ranges are better known among hackers, and therefore get attacked more.

dial-up modems
This varies widely, though you should see a scan against your system about once per month. It depends upon how often you are online, and what ISP you use. Since some hackers "camp" on IP addresses (waiting for people to dial-up), you are most likely to be scanned within a few minutes after you connect to the Internet.

The following are the most common attacks/scans against your system. Because you are running a built-in firewall, the hackers rarely get past the "scanning" stage (they only "attack" the system if the "scan" reveals something interesting).

TCP port probe
Hacker looking a particular way at your system (using TCP). The hacker has a single exploit he/she is trying on millions of systems.

UDP port probe
Same as above, but with UDP.

Trojan Horse probe
Testing to see if you've been compromised by a Trojan Horse, using TCP.

TCP port scan
Hacker is scanning for all the open ways into your system.

WhatsUp scan
Hacker is scanning you with a popular program called "WhatsUp".

UDP Trojan Horse probe
Similar as above, but using UDP.

SOCKS port probe
Hacker is testing your system for SOCKS, which might allow him/her to hide behind your system when attacking others.

Back Orifice ping
Testing your system to see if you are vulnerable to Back Orifice.

ICMP unreachable storm
Trying to disconnect your system from the network.

SNMP discovery broadcast
Scanning your area of the network in order to discover systems.

SUNRPC port probe
Testing your system to see if it supports UNIX, and then to see which UNIX-specific ways he/she can break into your system with. Obvious not a concern if you are running Windows.

TELNET port probe
Another UNIX-specific test against your system.

NetBIOS port probe
Tests to see if you have shared your hard disk with the rest of the world (10% of Windows users do this).

The following are the most common reasons hackers attack systems:

Island hopping
The hacker hopes to compromise your cable-modem or DSL connected computer because it is often on 24-hours a day, and because it always has the same IP address. The hacker hopes to then funnel all his/her attacks through your machine in order to hide his/her true IP address. Hackers often chain multiple machines together like this. See SOCKS for more info.

ISP Passwords
The hacker wants to scan your system for passwords. If they find your ISP information, they can dial-up as you and use your account for their nefarious deeds. For example, they can dial in from a pay phone and use your account to attack the Pentagon.

Web-site Passwords
They are hoping maybe you have a paid account with porn sites, and they want to steal those passwords so they can log in for free.

Corporate Passwords
They are hoping you have some passwords on your machine (for telecommuting) that they can use to bypass corporate firewalls.

Personal Information
They are hoping to find maiden names, children names, social security numbers and so on in order to commit "identity theft". If they get this information, they can often steal money from your bank account.

Online stock info
Some want simply to buy/sell stocks in your name, others want a check cut to their name. If a hacker buys/sells stocks in your name, you are liable for the result.

Online bank info
The hacker wants to steal money from your account. You are liable for losses in this manner.

Credit card info
The hacker wants to steal your credit card. They will often use it for porn accounts. You are generally NOT liable for credit card loss if you check your bill regularly. For most credit cards, the maximum damages you are liable for are $50.
Reply

Use magic Report


ADVERTISEMENT


Post time 26-1-2005 01:53 AM | Show all posts
i really likes the blackice defender but have to purchase it to use.
I dont mind if i cant obtain it as i'm using iptables
Reply

Use magic Report

You have to log in before you can reply Login | Register

Points Rules

 

ADVERTISEMENT


Forum Hot Topic
...BYE 2024, HELLO 2025...
seribulan...BYE 2024, HELLO 2025...
Views : 54993 Replies : 13
...AZAM TAHUN 2025...
seribulan...AZAM TAHUN 2025...
Views : 55522 Replies : 25
[Netflix 2021] SQUID GAME Season 1,2,3 - Lee Jung Jae, Lee Byung Hun, Wi Ha Joon, Gong Yoo ~ 26 Dec 2024 (Season 2), 2025 (Final Season)
Rahah[Netflix 2021] SQUID GAME Season 1,2,3 -
Views : 29125 Replies : 254
...CHAT HUMANITARY...HAPPY NEW YEAR...
seribulan...CHAT HUMANITARY...HAPPY NEW YEAR...
Views : 44248 Replies : 29
V82: HANIS HAIZI B. ABD HAMID Melarikan Diri Dari Bayar Cukai LHDN Ke Los Angeles CA
anony-mousV82: HANIS HAIZI B. ABD HAMID Melarikan
Views : 11125 Replies : 449
New Chapter 01: FATTAH AMIN ~ Bebaskanlah mimpi-mimpi terindah
codenamedreamNew Chapter 01: FATTAH AMIN ~ Bebaskanla
Views : 47200 Replies : 1958
siri ikonik Korea, Squid Game 2 ditayangkan di Neflix hari ini
YgBenarsiri ikonik Korea, Squid Game 2 ditayang
Views : 13087 Replies : 5
Instafamous Rempit (kak yah, kak zah & the geng) part 3
hotmakInstafamous Rempit (kak yah, kak zah & t
Views : 232317 Replies : 1832
madu gula tok matahari
aaanf14madu gula tok matahari
Views : 109982 Replies : 1152
Acikpor vs. Ngai, isu tajaan MARA dikorek
maklukpenggodaAcikpor vs. Ngai, isu tajaan MARA dikore
Views : 52274 Replies : 1477

 

ADVERTISEMENT


 


ADVERTISEMENT
Follow Us

ADVERTISEMENT


Mobile|Archiver|Mobile*default|About Us|CariDotMy

28-12-2024 08:13 AM GMT+8 , Processed in 0.179887 second(s), 16 queries , Gzip On, Redis On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

Quick Reply To Top Return to the list