On 22/02/16 18:27, Russ Allbery wrote:
> Carlos Alberto Lopez Perez <clo...@igalia.com> writes:
> 
>> Attackers usually don't start trying to probe exploit after exploit.
> 
> Of course they do.  That is, *by far*, the most common attacker strategy
> on the Internet.  Just look at the logs of any Internet-facing service.
> 

Yes, there are some attackers that do silly things like that. And since
they make lot of noise they appear also a lot on the logs.

But it happens that there are also intelligent attackers out there. They
will first try to find hosts running the affected version that their
exploit targets. This last ones are usually more successful and you
won't see them in the logs of any Internet-facing service because they
don't make noise trying exploit after exploit.

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to