[prev in list] [next in list] [prev in thread] [next in thread] 

List:       voipsec
Subject:    [VOIPSEC] VoIP Abuse to Twitter
From:       "J. Oquendo" <sil () infiltrated ! net>
Date:       2011-08-22 20:25:06
Message-ID: 4E52BB22.3090606 () infiltrated ! net
[Download RAW message or body]

Apologies for cross posting but some of us aren't on the other list
(vice/versa) and thought both groups would benefit.

For those familiar with the VoIP Abuse Project, no need to explain the
gist of this. I got tired of parsing through the alerts (lists) I
receive via email daily. They're long and sometimes I don't have the
time to post them all. So for now, posting VoIP Abuse addresses straight
to Twitter.

So, anyone trying to compromise a pbx, is now autoposted on an hourly
basis to Twitter. Still working on pulling, have about 4 machines linked
up now, will mop em up during the week.

http://twitter.com/#!/voipabuse

Now, you can concoct a quick script off of it, e.g.:

links -dump "http://twitter.com/voipabuse"|awk '/attacker/{print
"iptables -A INPUT -s "$2" -j DROP"| "sort -u"}'

Will get a quickie soon from my Acme's, nCites, etc. when I have time.

For those NOT familiar with it, please Google it as I don't feel like
typing anymore ;) (sorry)

-- 

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP, GREM

"It takes 20 years to build a reputation and five minutes to
ruin it. If you think about that, you'll do things
differently." - Warren Buffett

42B0 5A53 6505 6638 44BB  3943 2BF7 D83F 210A 95AF
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x2BF7D83F210A95AF


_______________________________________________
Voipsec mailing list
Voipsec@voipsa.org
http://voipsa.org/mailman/listinfo/voipsec_voipsa.org
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic