[asterisk-users] Results of security honeypot experiment - scraping for IP's/credentials ?
Olivier
oza.4h07 at gmail.com
Wed Jun 3 15:30:16 CDT 2015
Very interesting !
Thank you very much for sharing this here.
2015-06-03 3:12 GMT+02:00 Michelle Dupuis <mdupuis at ocg.ca>:
> The results of a security experiment were published this week, in which
> an Asterisk PBX was set out in the wild to see who would attack it and how:
>
>
> http://www.telium.ca/?honeypot1
>
>
> What I find particularly interesting is that people/bots are scraping
> support websites looking for valid IP's of PBX's, and valid credentials!
>
>
> A good reminder to everyone on this list to not publish the IP of their
> PBX's, or even account names (in postings) as they will be quickly
> targeted....
>
>
> --
> _____________________________________________________________________
> -- Bandwidth and Colocation Provided by http://www.api-digital.com --
> New to Asterisk? Join us for a live introductory webinar every Thurs:
> http://www.asterisk.org/hello
>
> asterisk-users mailing list
> To UNSUBSCRIBE or update options visit:
> http://lists.digium.com/mailman/listinfo/asterisk-users
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.digium.com/pipermail/asterisk-users/attachments/20150603/a2ae8d90/attachment.html>
More information about the asterisk-users
mailing list