I have been watching for a while the IP Address of 128.61.240.66 which would appear in the logs almost everyday as shown in the picture below:
Noticing the URL or what appears to be a URL in the banner. I wanted to know more about this scan or these scan occurrences. First I googled and then I visited the site and this is what you see upon visiting "http://netscan.gtisc.gatech.edu":
I find this project intriguing that they are collecting the banners and then monitoring them as they change. This would provide information of patches that are deployed to webservers, up-time, and change amongst the web servers. I thought I would go a little further and try and find if they release this information on their website at https://gtisc.gatech.edu/index.html.
From the links provided at this site I could not find this information but I did find the following links to be of interest:
Emerging Cyber Threats Report 2015
2014 Georgia Tech Cyber Security Summit
Twitter: @lokut
This blog is for educational purposes only. The opinions expressed in this blog are my own and do not reflect the views of my employers.
Subscribe to:
Post Comments (Atom)
Test Authentication from Linux Console using python3 pexpect
Working with the IT420 lab, you will discover that we need to discover a vulnerable user account. The following python3 script uses the pex...
-
Here is a quick walk through of GetBoo. The first item that I found was you can harvest the usernames of the existing users that are regist...
-
As I was glancing through the logs of my honeypots I spent some time to look at the following logs. In the past I have just overlooked them...
-
I thought I would work through a few of these web applications provided by OWASP on their broken web applications VM. The first one I th...
-
Today looking at the logs of the honeypots, I became curious based on the whois of the IP Addresses attempting to login to SSH which country...
-
Recently I was doing some scanning with a tool that is available on github called masscan. The tool allows you to configure a configuration...
No comments:
Post a Comment