Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Networking Security Technology

Is Retaliation the Answer To Cyber Attacks? 142

coondoggie writes "Should revenge assaults be just another security tool large IT shops use to counter cyber attacks? It's a controversial idea, and the law generally frowns on cyber attacks in general, but at the Black Hat DC conference last week, some speakers took up the issue of whether and how organizations should counterattack against adversaries clearly using attack tools to break into and subvert corporate data security."
This discussion has been archived. No new comments can be posted.

Is Retaliation the Answer To Cyber Attacks?

Comments Filter:
  • by slackz ( 1980906 ) on Saturday January 22, 2011 @07:00PM (#34968174)
    But I am curious about about the machines that are responsible for a lot of attacks online. A year or so ago I noticed ssh brute force attempts in /var/log/secure and found a cool solution called denyhosts [sourceforge.net] that parses log files, adjusts /etc/hosts.deny, and logs all activity. This got me thinking about a project... I would really like to create some NSE (nmap scripting engine) scripts, or something similar, to go through and scan the machines that show up in my log files as trying to weasel their way in via ssh or other common, filtered tools. It would be interesting to create some visual representations of services, geographical locations, and general makeup of the boxes that are attacking these services.

BLISS is ignorance.

Working...