On Sun, Jun 26, 2005 at 03:27:01PM +0200, [EMAIL PROTECTED] wrote:
> I've a question related to PF.
> 
> SpamD provides a trap. If somebody sends e-Mail to a e.g. special
> mailadress this host will be added to a list.
> 
> Is there any spamtrap-like Mechanism for the pf?
> E.g. more skilled "badguys" don't use `nmap -sS &target`.
> Such guys will limit their scans to just a few ports (3-6).
> 
> But if I know that I don't provide e.g. Telnet couldn't the Telnetport be
> a "Trapport"? An attacker who connects to that port gets blocked like
> SpamD does it with spammers.
> 
> The question I've after reading all the Documentation (realy everything):
> Is there such a mechanism?
> I ask because I didn't noticed anything about such a system.
> 
> Kind regards,
> Sebastian


this is just a little pet project ive been working on, but sadly have been busy 
with way too many other things to do what i want with it yet.

http://shbl.openjunkies.org

its all explained there, i know other people are collecting this data in lots 
of different ways, with snort, or scanning auth logs, but ive played around 
with them and the guests list catches 99% of scans as guest:guest is such a 
classic mistake.

enjoy,

sbr

Reply via email to