[TPU]Drivers from Over 40 Manufacturers Including Intel, NVIDIA, AMD Vulnerable to Privilege Escalation Malware Attacks - Page 3 - Overclock.net - An Overclocking Community

Forum Jump: 

[TPU]Drivers from Over 40 Manufacturers Including Intel, NVIDIA, AMD Vulnerable to Privilege Escalation Malware Attacks

Reply
 
Thread Tools
post #21 of 22 (permalink) Old 08-14-2019, 01:16 PM
Otherworlder
 
epic1337's Avatar
 
Join Date: Feb 2011
Posts: 7,334
Rep: 217 (Unique: 125)
Quote: Originally Posted by xJumper View Post
Doesn't work like that...

Nobody tries to specifically target anyone, ports scanners crawl the web probing every single combination of IP address and all 65,535 TCP/UDP ports.

When I was running a server from my house with a mere 11 ports open my logs would be filled with hundreds of probing/brute force attempts.

The amount of people who are unknowingly part of a large bot net or have their routers DNS hijacked/poisoned is huge. Open ports with vulnerable applications get you owned.
but thats different from being specifically targeted, plus a sensible firewall can handle "most" probing attacks.

trolling an adult is very dangerous, don't try it at home nor at work. you don't want to play tag with a rabid man.
epic1337 is offline  
Sponsored Links
Advertisement
 
post #22 of 22 (permalink) Old 08-16-2019, 12:17 PM
Old to Overclock.net
 
Join Date: Jan 2008
Posts: 2,059
Rep: 119 (Unique: 103)
Quote: Originally Posted by epic1337 View Post
but thats different from being specifically targeted, plus a sensible firewall can handle "most" probing attacks.
Very few firewalls have active counter measures. If you have an open port and a vulnerable service listening on it, it can be found and exploited.

Even running an up to date server with no vulnerabilities I was getting bots trying to brute force port 22 SSH and even with no known flaws unless you have a 20+ random character password there's a good chance someone can brute force their way in. Even with a strong password I had to implement active counter measures like fail2ban to ban peoples IP's after 3 unsuccessful attempts, there was just crap loads of bots probing and taking drive by pot shots.

Without active counter measures people can basically take infinite shots at you until a successful exploit is found.

362436
(15 items)
CPU
AMD Ryzen 5 1600
Motherboard
Asus Prime X370-A AMD Ryzen AM4 DDR4
GPU
Gigabyte GeForce GTX 950
RAM
2x Corsair Valueselect 8GB 288 Pin DDR4 SDRAM DDR4 @ 2133
Hard Drive
Corsair Force LS 2.5" 120GB SATA III MLC SSD
Optical Drive
Lite-On 24X SATA DVD/RW Optical Drive
Power Supply
Corsair RM550x 550W 80 Plus Gold
Cooling
Noctua NH-L9A-AM4 Low-Profile
Case
Antec NSK4100 Steel ATX Mid Tower
Operating System
Mint 18.2 x64
Monitor
HP 24" LCD/LED 1920x1080
Keyboard
IBM PC-AT
Mouse
Logitech G5
Audio
Sennheiser HD650
Audio
Asus Essence STX II
▲ hide details ▲


xJumper is offline  
Reply

Quick Reply
Message:
Options

Register Now

In order to be able to post messages on the Overclock.net - An Overclocking Community forums, you must first register.
Please enter your desired user name, your email address and other required details in the form below.
User Name:
If you do not want to register, fill this field only and the name will be used as user name for your post.
Password
Please enter a password for your user account. Note that passwords are case-sensitive.
Password:
Confirm Password:
Email Address
Please enter a valid email address for yourself.
Email Address:

Log-in



Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Show Printable Version Show Printable Version
Email this Page Email this Page


Forum Jump: 

Posting Rules  
You may post new threads
You may post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off