-----Original Message-----
From:   Merton Campbell Crockett [SMTP:[EMAIL PROTECTED]]
Sent:   Saturday, February 19, 2000 10:06 PM
To:     Bill Lavalette noc/sec Administrator
Cc:     'Security Related'; [EMAIL PROTECTED]
Subject:        RE: Someone is scanning me

On Sat, 19 Feb 2000, Bill Lavalette noc/sec Administrator wrote:

> The Bottom Line is this. YOU HAVE NO BUSINESS SCANNING ANYONE'S
> MACHINE!!!!!  unless it is requested by the owner/company

You're shouting does not alter the fact that I have a perfect right and an
obligation to my employers and customers to probe your network.
[Bill Lavalette]  you better check your federal laws again.  you do not 
have any right or justification to snoop another network you are doing the 
same thing as the bad guy and no matter how you justify your actions you 
will lose in a court of law. I do this for a living and have been to court. 
a phone call is your best weapon how can you sit there and justify to me a 
nmap scan of my network ? give me a solid concrete example.

By allowing any packet originating from your network to pass into one of 
the
networks under my control, you have authorized me to monitor your activity.
[Bill Lavalette]  this is only true of incoming packets you can not launch 
a sscan or Nmap scan of my network because I replied to a email or sent 
one?  lets be real.

Of course, my probes will be fairly straight forward as I will be building
the foundation for a criminal investigation and a court case.
[Bill Lavalette]  and you will say..... I utilized the same hacking tools 
as the perpetrator and scanned a innocent host and found what?? Nmap is a 
good tool at very best all you will learn is what ports are open maybe even 
the os possibly a TCP sequence prediction but you have committed the same 
offense have you not? so I suppose with this line of thinking your using if 
you were Smurf attacked you would launch a Smurf of your own? this is 
exactly what my point is.

The word, "scanning", is almost too generic a word to use.  It covers a 
wide
range of activities from a simple probe to verify that a system is active
and could be the system originating questionable activity to an extremely
aggressive
[Bill Lavalette]  a scan is a scan a probe is a probe they are not the same 
and the use is not the same as well . if I'm denying your traffic and I see 
you trying to gain access you have committed a offense in my book lets be 
realistic here you are aware of what I'm speaking of and you know this to 
be true why even bother to waste your time sending me a reply I truly hope 
for your sake that you  are not nmapping the world on every suspicious 
packet that comes your way if so your setting yourself up for a big fall. 
least in my opinion.
attempt to locate open service ports on every system on a
network.



Merton Campbell Crockett

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to