[sdnog] Understanding the Origins of Anomalous Open DNS Resolvers

Ahmad Yassin amyassin77 at gmail.com
Sun Mar 8 10:46:45 SAST 2015

Thanks Daniel for the extra reading materials :)

just wondering: to what extend is scanning the internet legal? Obviously
the Carna botnet is illegal cuz it actively infecting hosts and alter the
way and purpose they function, but is it legal to scan the internet
randomly for, say, open resolvers and query them? Can anyone run arbitrary
port scans for open ports and try to interact with services? and can
country specific laws be enforced in such cases?


On Sat, Mar 7, 2015 at 11:00 PM Daniel Shaw <dshaw78 at gmail.com> wrote:

> > On Mar 7, 2015, at 02:27, Ahmad Yassin <amyassin77 at gmail.com> wrote:
> >
> > That is so interesting. So we can be a part of a huge DDoS attack
> without knowing and not only by getting infected by a PC virus or worm
> becoming part of a botnet!
> This was indeed an interesting read. Not a problem with home routers I’d
> heard of before!
> However, there are other common problem with these kinds of devices
> (consumer home routers) that can be exploited. Some more reading material
> :) ...
> http://internetcensus2012.bitbucket.org/paper.html
> https://www.team-cymru.com/ReadingRoom/Whitepapers/2013/
> TeamCymruSOHOPharming.pdf
> http://krebsonsecurity.com/2015/01/lizard-stresser-runs-
> on-hacked-home-routers/
> - Daniel
> _______________________________________________
> Sdnog mailing list
> Sdnog at sdnog.sd
> http://lists.sdnog.sd/mailman/listinfo/sdnog
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sdnog.sd/pipermail/sdnog/attachments/20150308/cb6df375/attachment.html>

More information about the sdnog mailing list