They could of gotten access to another device on your network and used it as a jump box to the E2.Dragging this back up. Found a E2 box been hacked that was running with Suls plugin.
Line was posted online with that box's DNS. No ports were open. Anyone any idea how they would have got it in or sniffing the traffic?
I dont know enough of how Suls works to understand.
Anyone on here in the know?
Quality mate, thanks for the heads upYep sentry, snipr, hitman, storm, letsbrutit... are all configurable brute forcers, then there's loads of scanners and checkers dedicated to individual sites or particular services like vpn or iptelly services too like panel taram, IPTV scanner, playlist scanner, panel ariyici ... there's loads of them.
You can set them up with proxy lists (or not) and lists of userass combos to cycle through and monitor the responses from millions of login attempts automatically so as I say ^^ don't reuse passwords that may already have been leaked and therefore on
mya list already or any lazy generic shite like jon:jon, jon:jon1, jon:jon123, jon:123456 ..... cos they're on myoops I mean a list somewhere too