There isn't really a 'new' bind exploit, but there are the same old ones spread everywhere. It's very worth-while to scan around for bind exploits, because if you think about it, how many people (especially home users and people new to linux) sat and downloaded all the patches and updates for their box as soon as they installed their shiney new Redhat 6.1 they got for $5 at Egghead.... or worse yet, how many people don't know an exploit even exists or that you have to update your OS... or think "nah, they will never get me I'm just a home user". Break a couple hundred dsl and cablemodem users, and you have enough DDos power to take down a larger website. Lowell Craig White wrote: > > > -----Original Message----- > > From: plug-discuss-admin@lists.plug.phoenix.az.us > > [mailto:plug-discuss-admin@lists.plug.phoenix.az.us]On Behalf Of James > > Bell > > Sent: Friday, May 04, 2001 1:20 AM > > To: plug-discuss@lists.plug.phoenix.az.us > > Subject: Re: Ethics Question > > > > > > Shoot, if you're not getting at least 10 portscans a week from China, > > Korea, and Taiwan, it's time to check if you're still connected to the > > net. Latest one I've been seeing a lot at work is a lot of sunRPC and > > DNS version scans from Italy. > > > ---- > Me too. I'm wondering if there's some new BIND exploit that's getting posted > around. > > Then I also had a progressive port scan from 212.199.1.146 (computer > currently pings, I'm running a traceroute right now - last identified name > was golden-lines-il-pa4.seabone.net [195.22.192.122]). Someday, I want to > learn how to crack into one of these jokers. > > Craig > > ________________________________________________ > See http://PLUG.phoenix.az.us/navigator-mail.shtml if your mail doesn't post to the list quickly and you use Netscape to write mail. > > PLUG-discuss mailing list - PLUG-discuss@lists.PLUG.phoenix.az.us > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss