[App_rpt-users] DIAL node hack

Steve Zingman szingman at msgstor.com
Wed Jun 14 16:07:25 UTC 2017


Best to zip up the /etc/asterisk directory.
The RC1 version disabled the exploited login.

Steve

On 6/14/2017 12:03 PM, DuaneVT . wrote:
> Our node is offline currently due to an exploit attack. Our network 
> administrator shows heavy traffic out on port 2222 among others. We 
> don't use this port.
> So reload the new image.
> For future reloads, how best to reconstruct the local changes done to 
> the original image to carry over the custom config files?
> 73,
> Duane KA1LM
>
>
>
> _______________________________________________
> App_rpt-users mailing list
> App_rpt-users at lists.allstarlink.org
> http://lists.allstarlink.org/cgi-bin/mailman/listinfo/app_rpt-users
>
> To unsubscribe from this list please visit http://lists.allstarlink.org/cgi-bin/mailman/listinfo/app_rpt-users and scroll down to the bottom of the page. Enter your email address and press the "Unsubscribe or edit options button"
> You do not need a password to unsubscribe, you can do it via email confirmation. If you have trouble unsubscribing, please send a message to the list detailing the problem.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.keekles.org/pipermail/app_rpt-users/attachments/20170614/ea37f2eb/attachment.html>


More information about the App_rpt-users mailing list