G
Guest
I'm investigating a hacking attempt on our Windows 2003 server. We had 56
bad attempts to guess a user's password. Below is the detail of the attempt
with the identifiable information removed:
Logon Failure:
Reason: Unknown user name or bad password
User Name: (e-mail address removed)
Domain: OUR_DOMAIN
Logon Type: 8
Logon Process: Advapi
Authentication Package: Negotiate
Workstation Name: AUB04
Caller User Name: OUR_SERVER$
Caller Domain: OUR_DOMAIN
Caller Logon ID: (0x0,0x3E7)
Caller Process ID: 8224
Transited Services: -
Source Network Address: XXX.XXX.XXX.XXX
Source Port: 1224
Looking up port 1224, it appears to be something called VPNz... what is VPNz
and what should I do about it? The password has already been changed.
Thanks,
Dan
bad attempts to guess a user's password. Below is the detail of the attempt
with the identifiable information removed:
Logon Failure:
Reason: Unknown user name or bad password
User Name: (e-mail address removed)
Domain: OUR_DOMAIN
Logon Type: 8
Logon Process: Advapi
Authentication Package: Negotiate
Workstation Name: AUB04
Caller User Name: OUR_SERVER$
Caller Domain: OUR_DOMAIN
Caller Logon ID: (0x0,0x3E7)
Caller Process ID: 8224
Transited Services: -
Source Network Address: XXX.XXX.XXX.XXX
Source Port: 1224
Looking up port 1224, it appears to be something called VPNz... what is VPNz
and what should I do about it? The password has already been changed.
Thanks,
Dan