[Beowulf] A careful exploit?
William Johnson
meatheadmerlin at gmail.com
Sat Jun 15 17:59:17 PDT 2019
It is a long shot but maybe...
https://www.bbc.com/news/technology-44438812
Perhaps an oddity of a firewall-like provision to satisfy compliance with
the new European "Oath" provisions.
https://www.youtube.com/saveyourinternet/
As I understand it,
the spirit of the legislation is to provide the requirement that a
corporation
gives a person the right to opt out of marketing data collection on a
per-machine basis.
And it makes American corporations agree to at least that much to "play in
the real world" outside America.
_
On Sun, Jun 9, 2019 at 4:42 PM Jonathan Engwall <
engwalljonathanthereal at gmail.com> wrote:
> Hello Beowulf,
> Recently we had serious trouble with the internet. A technician had to
> climb the pole. Another technician, an IT specialist in Mexico City, could
> not resolve the issue, sent the man here.
> Now trouble is back. What does this mean? Where are the missing IPs? From
> the pole to the modem, to my repeater, to my machine, and then my VM gives
> this using nmap:
>
> Starting Nmap 6.40 ( http://nmap.org ) at 2019-06-09 13:30 PDT
> Initiating Ping Scan at 13:30
> Scanning 256 hosts [2 ports/host]
> Completed Ping Scan at 13:31, 6.64s elapsed (256 total hosts)
> Initiating Parallel DNS resolution of 256 hosts. at 13:31
> Completed Parallel DNS resolution of 256 hosts. at 13:31, 0.04s elapsed
> Nmap scan report for 192.168.0.0 [host down]
> Nmap scan report for 192.168.0.1
> Host is up (0.0080s latency).
> Nmap scan report for 192.168.0.2
> Host is up (0.00068s latency).
> Nmap scan report for 192.168.0.3 [host down]
> Nmap scan report for 192.168.0.4 [host down]
> Nmap scan report for 192.168.0.5
> Host is up (0.063s latency).
> Nmap scan report for 192.168.0.6
> Host is up (0.00068s latency).
> Nmap scan report for 192.168.0.7 [host down]
> Nmap scan report for 192.168.0.8 [host down]
> Nmap scan report for 192.168.0.9 [host down]
> Nmap scan report for 192.168.0.10 [host down]
> Nmap scan report for 192.168.0.11 [host down]
>
> Is this a new exploit?
> Thank you,
> Jonathan Engwall
> _______________________________________________
> Beowulf mailing list, Beowulf at beowulf.org sponsored by Penguin Computing
> To change your subscription (digest mode or unsubscribe) visit
> https://beowulf.org/cgi-bin/mailman/listinfo/beowulf
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://beowulf.org/pipermail/beowulf/attachments/20190615/c099aa0e/attachment.html>
More information about the Beowulf
mailing list