Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

Faites chier les FAI

0 views
Skip to first unread message

Zopilote

unread,
Oct 28, 2010, 8:16:35 AM10/28/10
to
Envoyez leur un max de relev�s de logs afin que leurs routeurs (en particulier les routeurs BGP)
black listent les connexions issues de ce pays de merde qu'est la Chine qui laisse ou encourage le
hacking, les attaques DOS etc.

exemple :
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,27977 - [DOS] 192.168.0.1 28/10 11:15:00.890
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,9090 - [DOS] 192.168.0.1 28/10 11:15:00.890
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8090 - [DOS] 192.168.0.1 28/10 11:15:00.906
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,1080 - [DOS] 192.168.0.1 28/10 11:15:00.906
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8000 - [DOS] 192.168.0.1 28/10 11:15:00.937
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,2301 - [DOS] 192.168.0.1 28/10 11:15:00.937
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8118 - [DOS] 192.168.0.1 28/10 11:15:00.953
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,6588 - [DOS] 192.168.0.1 28/10 11:15:01.015
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,27977 - [DOS] 192.168.0.1 28/10 13:36:02.015
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,9090 - [DOS] 192.168.0.1 28/10 13:36:02.031
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8090 - [DOS] 192.168.0.1 28/10 13:36:02.031
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,1080 - [DOS] 192.168.0.1 28/10 13:36:02.046
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8000 - [DOS] 192.168.0.1 28/10 13:36:02.046
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,2301 - [DOS] 192.168.0.1 28/10 13:36:02.062
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8118 - [DOS] 192.168.0.1 28/10 13:36:02.078
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,8088 - [DOS] 192.168.0.1 28/10 13:52:58.140
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,8008 - [DOS] 192.168.0.1 28/10 13:52:58.156
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,73 - [DOS] 192.168.0.1 28/10 13:52:58.156
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,7212 - [DOS] 192.168.0.1 28/10 13:52:58.171
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,6588 - [DOS] 192.168.0.1 28/10 13:52:58.171
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,8080 - [DOS] 192.168.0.1 28/10 13:52:58.187

Petit Volcan

unread,
Oct 30, 2010, 2:39:26 AM10/30/10
to


On 28/10/10 14:16, in article 4cc9...@news.x-privat.org, "Zopilote"
<ya...@no.mail> wrote:

> Envoyez leur un max de relevés de logs afin que leurs routeurs (en particulier


> les routeurs BGP)
> black listent les connexions issues de ce pays de merde qu'est la Chine qui
> laisse ou encourage le
> hacking, les attaques DOS etc.
>

Pauvre con. Parle un peu avec les chinois avant de raconter n'importe quoi !
Ces blocages sont illusoires !

0 new messages