SSH and Telnet ports

Mitar mmitar at gmail.com
Sun Dec 14 22:25:03 UTC 2008


Hi!

On Sun, Dec 14, 2008 at 8:48 PM, Dominik Schaefer <schaedpq2 at gmx.de> wrote:
> Concerning the aspect of using Tor to target others: I would be very
> surprised if anyone actually tries to use Tor for this, ordinary botnets of
> owned machines are completely sufficient.

Invalid SSH login attempts are often reported and some of systems in
botnets are taken down because of this. By hiding behind Tor network
they can make those reports useless thus systems in botnet will be
longer available to them.


Mitar



More information about the tor-talk mailing list