[asterisk-users] Asterisk brute force watcher (was FYI)

J. Oquendo sil at infiltrated.net
Thu Apr 26 05:18:06 MST 2007


Steve Kennedy wrote:
> On Thu, Apr 26, 2007 at 06:46:41AM -0400, J. Oquendo wrote:
>
>   
>> Steve Totaro wrote:
>>     
>>> I suspect that this will happen more and more.  I also suspect that many
>>> people who have weak SIP credentials like user=100 secret=100 will be
>>> the victim of toll fraud and worse, call to 900 and other very high
>>> termination rates.  How does $25 per minute sound?
>>>       
>> Ashtray is an Asterisk brute force watcher. Checks logs from cron and 
>> emails admin of potential brute forcers
>> http://www.infiltrated.net/scripts/ashtray
>> Can have it set in .bash_profile so whenever you log on, you'd see 
>> anomalies.
>>     
>
> With FC5 had to change to $8 and $11
>
>
> Steve
>
>   
Weird...

uname -a
Linux linuxbox 2.6.15-1.2054_FC5 #1 Tue Mar 14 15:48:33 EST 2006 i686 
i686 i386 GNU/Linux

I didn't

-- 
====================================================
J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 

"Wise men talk because they have something to say;
fools, because they have to say something." -- Plato


-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 5157 bytes
Desc: S/MIME Cryptographic Signature
Url : http://lists.digium.com/pipermail/asterisk-users/attachments/20070426/8ac5ddf1/smime.bin


More information about the asterisk-users mailing list