RE: hacking challenge [7:66720]

2003-04-04 Thread Wilmes, Rusty
Many thanks to all who replied.  I've got some good verbage now.  In
particular the multi-layer defense.  

 -Original Message-
 From: Evans, TJ (BearingPoint) [mailto:[EMAIL PROTECTED]
 Sent: Thursday, April 03, 2003 12:36 PM
 To: [EMAIL PROTECTED]
 Subject: RE: hacking challenge [7:66720]
 
 
 So ... doesn't that give them enough supporting evidence all 
 by itself?
   If not, maybe it is a lost cause?
 
 As an aside - a pix, if it was permitting the offending port 
 through as
 well, may not have stopped the worm either.  Think Defense 
 in Depth.  A
 firewall, while a necessity for -everyone- (IMHO) is not a 
 cure-all; it is a
 piece of a very large, very complex puzzle (even for a small 
 network!).
 
 ..
 Have someone in a Decision-making position there read 
 Hacking __(pick an os
 - Windows2k, Linux, etc.), or attend a SANS course (or 
 just visit their
 reading room - TONS of articles).  Read Eric Cole's or Ed 
 Skoudis's books.
 .. or, teach him/her to use google ... 
 
 
 Thanks!
 TJ
 -Original Message-
 From: Wilmes, Rusty [mailto:[EMAIL PROTECTED] 
 Sent: Thursday, April 03, 2003 2:05 PM
 To: [EMAIL PROTECTED]
 Subject: RE: hacking challenge [7:66720]
 
 there's an access list on the ethernet interface thats 
 directly connected to
 a dsl modem.
 
 they're allowing telnet and smpt to basically, any any plus 
 various other
 protocols from/to specific addresses.  There're only two 
 outside addresses
 that are natted but its really hideous and the access list is 
 the only thing
 resembling a layer of security between the internet and their 
 server farm.  
 
 I was just hoping to hear some really good verbage about how 
 vulnerable they
 are.  I've told them for 3 months to get a pix but it just 
 aint sinking in.
 Now they've got a worm loose on their mail server thats 
 bringing down their
 main host system and their internet line (but thats another story).
 
 
 
  -Original Message-
  From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED]
  Sent: Thursday, April 03, 2003 8:46 AM
  To: [EMAIL PROTECTED]
  Subject: RE: hacking challenge [7:66720]
  
  
  Wilmes, Rusty wrote:
   
   this is a general question for the security specialists.
   
   Im trying to convince a client that they need a firewall
   
   so hypothetically, 
   
   if you had telnet via the internet open to a router (with an
   access list
   that allowed smtp and telnet) (assuming you didn't know the
   telnet password
   or the enable password)that had a bunch of nt servers on
   another interface,
  
  Do you actually mean that you are allowing Telnet and SMTP to 
  go through the
  router? You said to above which is confusing. Allowing 
 Telnet to the
  router unrestricted would be a horrible security hole, even 
  for people who
  don't know the password because passwords are often guessable.
  
  But I don't think that's what you meant...
  
  Allowing Telnet and SMTP through the router is more common, 
  especially SMTP.
  You have to allow SMTP if you have an e-mail server that gets 
  mail from the
  outside world. Avoid Telnet, though, if you can. It sends all 
  text as clear
  text, including passwords.
  
  The question is really how vulnerable is the operating system 
  that the SMTP
  server is running on? It's probably horribly vulnerable if 
 your client
  hasn't kept up with the latest patches, and it sounds like 
  your client is
  the type that hasn't? In fact, the server is probably busy 
  attacking the
  rest of us right now! ;-0
  
  So, as far as convicing your customer
  
  The best way may be to put a free firewall, like Zone Alarm, 
  on the decision
  maker's computer and show her/him all the attacks happening 
  all the time. Or
  if she already has a firewall, walk her through the log.
  
  Good luck. I have a good book to recommend on this topic:
  
  Greenberg, Eric. Mission-Critical Security Planner. New 
  York, New York,
  Wiley Publishing, Inc., 2003.
  
  Here's an Amazon link:
  
  http://www.amazon.com/exec/obidos/ASIN/0471211656/opendoornetw
  inc/104-9901005-4572707
  
  Priscilla
  
   how long would it take a determined hacker a) cause some kind
   of network
   downtime and b) to map a network drive to a share on a file
   server over the
   internet. 
   
   Thanks,
   Rusty
   
-Original Message-
From: Larry Letterman [mailto:[EMAIL PROTECTED]
Sent: Wednesday, April 02, 2003 1:44 PM
To: [EMAIL PROTECTED]
Subject: RE: VLAN loop problem [7:66656]


Yes,
it prevents loops in spanning tree on layer 2 switches from 
causing a loop
by disabling the port on a cisco switch...


Larry Letterman
Network Engineer
Cisco Systems





 -Original Message-
 From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] Behalf Of
 Thomas N.
 Sent: Wednesday, April 02, 2003 12:18 PM
 To: [EMAIL PROTECTED]
 Subject: Re: VLAN loop problem [7

Re: hacking challenge [7:66720]

2003-04-03 Thread Steven Aiello
Depending on the servers you could do it in 5 min.  There is an 
annonamys account that runs over netbios in the 130's port area.  If 
there isn't a firewall in place to filer this port you can use the net 
use command and have access to the box.  After this you can download 
the backup copy of the SAM off the server run a crack program like 
lophtcrack and BLING BLING.  You have every user name and password on 
the system.  All to easy.

I would recommend the Hacking Exposed book.  If you want to protect your 
system from cracker / hackers.  You need to know what they can and will 
do to get what they want.  However don't let a firewall be your end all 
do all solution.  Look into hardening you Server OS, if its Win2k try 
learning about group policy's they are a wonderful addition.  If it's 
Novell or Linux, sorry I can't be much help.  But the rule applies

Steve




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=66753t=66720
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


RE: hacking challenge [7:66720]

2003-04-03 Thread Priscilla Oppenheimer
Wilmes, Rusty wrote:
 
 this is a general question for the security specialists.
 
 Im trying to convince a client that they need a firewall
 
 so hypothetically, 
 
 if you had telnet via the internet open to a router (with an
 access list
 that allowed smtp and telnet) (assuming you didn't know the
 telnet password
 or the enable password)that had a bunch of nt servers on
 another interface,

Do you actually mean that you are allowing Telnet and SMTP to go through the
router? You said to above which is confusing. Allowing Telnet to the
router unrestricted would be a horrible security hole, even for people who
don't know the password because passwords are often guessable.

But I don't think that's what you meant...

Allowing Telnet and SMTP through the router is more common, especially SMTP.
You have to allow SMTP if you have an e-mail server that gets mail from the
outside world. Avoid Telnet, though, if you can. It sends all text as clear
text, including passwords.

The question is really how vulnerable is the operating system that the SMTP
server is running on? It's probably horribly vulnerable if your client
hasn't kept up with the latest patches, and it sounds like your client is
the type that hasn't? In fact, the server is probably busy attacking the
rest of us right now! ;-0

So, as far as convicing your customer

The best way may be to put a free firewall, like Zone Alarm, on the decision
maker's computer and show her/him all the attacks happening all the time. Or
if she already has a firewall, walk her through the log.

Good luck. I have a good book to recommend on this topic:

Greenberg, Eric. Mission-Critical Security Planner. New York, New York,
Wiley Publishing, Inc., 2003.

Here's an Amazon link:

http://www.amazon.com/exec/obidos/ASIN/0471211656/opendoornetwinc/104-9901005-4572707

Priscilla

 how long would it take a determined hacker a) cause some kind
 of network
 downtime and b) to map a network drive to a share on a file
 server over the
 internet. 
 
 Thanks,
 Rusty
 
  -Original Message-
  From: Larry Letterman [mailto:[EMAIL PROTECTED]
  Sent: Wednesday, April 02, 2003 1:44 PM
  To: [EMAIL PROTECTED]
  Subject: RE: VLAN loop problem [7:66656]
  
  
  Yes,
  it prevents loops in spanning tree on layer 2 switches from 
  causing a loop
  by disabling the port on a cisco switch...
  
  
  Larry Letterman
  Network Engineer
  Cisco Systems
  
  
  
  
  
   -Original Message-
   From: [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED] Behalf Of
   Thomas N.
   Sent: Wednesday, April 02, 2003 12:18 PM
   To: [EMAIL PROTECTED]
   Subject: Re: VLAN loop problem [7:66656]
  
  
   What does portfast bpdu-guard do?  Does it prevent
 interfaces with
   portfast enabled from causing the loop in my scenario?
  
  
   Larry Letterman  wrote in message
   news:[EMAIL PROTECTED]
  
port mac address security might work, altho its a lot of
 admin
overhead..are you running portfast bpdu-guard on the
 access ports?
   
   
Larry Letterman
Network Engineer
Cisco Systems
   
   
  - Original Message -
  From: Thomas N.
  To: [EMAIL PROTECTED]
  Sent: Tuesday, April 01, 2003 8:14 PM
  Subject: VLAN loop problem [7:66656]
   
   
  Hi All,
   
  I got a problem in the production campus LAN here
 between
   VLANs.  Please
  help me out!  Below is the scenario:
   
  We have VLAN 10 (10.10.x.x) and VLAN 20 (10.20.x.x)
 subnets.
   Routing is
  enable/allowed between the two subnets using MSFC of 
  the 6500.  Each
   subnet
  has a DHCP server to assign IP address to devices on
 its subnet.
  Spanning-tree is enable; however, portfast is turned on
 on all
  non-trunking/uplink ports.  Recently, devices on VLAN
 10 got
   assigned an
   IP
  address of 10.20.x.x , which is from the DHCP on the 
  other scope and
   also
  from 10.10.x.x scope, and vice versa.  It seems that we
 a
   loop somewhere
  between the 2 subnets but we don't know where.  I 
  noticed lots of end
   users
  have a little unmanged hub/switch hang off the network 
  jacks in their
  cubicals and potentially cause loop.
   
  Is there any way that we can block the loop on the 
  Cisco switches
   without
  visiting cubicals taking those little umanaged 
  hubs/switches?  Thanks!
   
  Thomas
 
 




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=66758t=66720
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Re: hacking challenge [7:66720]

2003-04-03 Thread Karsten
 However don't let a firewall be your end all
 do all solution.  Look into hardening you Server OS, if its Win2k try
 learning about group policy's they are a wonderful addition.  If it's
 Novell or Linux, sorry I can't be much help.  But the rule applies

If you're looking for security on Win2k then here's some advice. Close
it off to the world. Completely. Run a PIX of PF firewall in front of your
networks behind a router. If you want a secure OS then move to a 
Linux or xBSD.  This is getting off topic.

-Karsten


On Thursday 03 April 2003 07:29 am, Steven Aiello wrote:
 Depending on the servers you could do it in 5 min.  There is an
 annonamys account that runs over netbios in the 130's port area.  If
 there isn't a firewall in place to filer this port you can use the net
 use command and have access to the box.  After this you can download
 the backup copy of the SAM off the server run a crack program like
 lophtcrack and BLING BLING.  You have every user name and password on
 the system.  All to easy.

 I would recommend the Hacking Exposed book.  If you want to protect your
 system from cracker / hackers.  You need to know what they can and will
 do to get what they want.  However don't let a firewall be your end all
 do all solution.  Look into hardening you Server OS, if its Win2k try
 learning about group policy's they are a wonderful addition.  If it's
 Novell or Linux, sorry I can't be much help.  But the rule applies

 Steve
 Nondisclosure violations to [EMAIL PROTECTED]




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=66763t=66720
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Re: hacking challenge [7:66720]

2003-04-03 Thread Kent Hundley
Rusty,

I'm not clear from your question if there is an acl blocking everything
inbound to the nt servers except smtp and telnet or if the acl is for
inbound to the router itself.  In the former case, unless your client is
forcing their users to use good passwords, it's likely that a brute
force telnet attempt would succeed in anywhere from a few hours to a few
days, ditto for brute force on the router. If they're not logging failed
login attempts, they would never know this was occurring.  

If they have no filtering if any kind inbound to their servers, there
are many netbios/nt vulnerabilities that they could be susceptible to,
without knowing more specifics about the patches applied and the
services being run I can't give you anything more specific.  You can
search on securityfocus.com to see what might be applicable to your
client.

One thing to keep in mind, for a small site the Cisco firewall feature
set may be adequate.  At the very least, a correctly configured
access-list provides some rudimentary protection.  See the cisco site or
Phrack issue 52 for info on Cisco router security. (phrack.com)  

Also, security works best when applied in layers.  It's not enough to
have a firewall, enabling centralized logging, patching and hardening
servers, backup procedures and implementing change control procedures
are just a few of the things that need to be done as well.  A firewall
is just the beginning.

HTH,
Kent

PS If your trying to get your client to take security seriously, you
should probably begin by asking business questions like: What is the
worth of the information contained on your servers? How long could you
operate without that information?  If you lost all of the information on
your servers, could your business operate? Are you aware of how much
money businesses lost last year due to security breaches according to
the FBI/CSI annual report?  Are you aware of the potential legal issues
related to not following due care practices for securing your
information infrastructure, etc. etc.

On Wed, 2003-04-02 at 19:09, Wilmes, Rusty wrote:
 this is a general question for the security specialists.
 
 Im trying to convince a client that they need a firewall
 
 so hypothetically, 
 
 if you had telnet via the internet open to a router (with an access list
 that allowed smtp and telnet) (assuming you didn't know the telnet password
 or the enable password)that had a bunch of nt servers on another interface,
 how long would it take a determined hacker a) cause some kind of network
 downtime and b) to map a network drive to a share on a file server over the
 internet. 
 
 Thanks,
 Rusty
 
  -Original Message-
  From: Larry Letterman [mailto:[EMAIL PROTECTED]
  Sent: Wednesday, April 02, 2003 1:44 PM
  To: [EMAIL PROTECTED]
  Subject: RE: VLAN loop problem [7:66656]
  
  
  Yes,
  it prevents loops in spanning tree on layer 2 switches from 
  causing a loop
  by disabling the port on a cisco switch...
  
  
  Larry Letterman
  Network Engineer
  Cisco Systems
  
  
  
  
  
   -Original Message-
   From: [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED] Behalf Of
   Thomas N.
   Sent: Wednesday, April 02, 2003 12:18 PM
   To: [EMAIL PROTECTED]
   Subject: Re: VLAN loop problem [7:66656]
  
  
   What does portfast bpdu-guard do?  Does it prevent interfaces with
   portfast enabled from causing the loop in my scenario?
  
  
   Larry Letterman  wrote in message
   news:[EMAIL PROTECTED]
  
port mac address security might work, altho its a lot of admin
overhead..are you running portfast bpdu-guard on the access ports?
   
   
Larry Letterman
Network Engineer
Cisco Systems
   
   
  - Original Message -
  From: Thomas N.
  To: [EMAIL PROTECTED]
  Sent: Tuesday, April 01, 2003 8:14 PM
  Subject: VLAN loop problem [7:66656]
   
   
  Hi All,
   
  I got a problem in the production campus LAN here between
   VLANs.  Please
  help me out!  Below is the scenario:
   
  We have VLAN 10 (10.10.x.x) and VLAN 20 (10.20.x.x) subnets.
   Routing is
  enable/allowed between the two subnets using MSFC of 
  the 6500.  Each
   subnet
  has a DHCP server to assign IP address to devices on its subnet.
  Spanning-tree is enable; however, portfast is turned on on all
  non-trunking/uplink ports.  Recently, devices on VLAN 10 got
   assigned an
   IP
  address of 10.20.x.x , which is from the DHCP on the 
  other scope and
   also
  from 10.10.x.x scope, and vice versa.  It seems that we a
   loop somewhere
  between the 2 subnets but we don't know where.  I 
  noticed lots of end
   users
  have a little unmanged hub/switch hang off the network 
  jacks in their
  cubicals and potentially cause loop.
   
  Is there any way that we can block the loop on the 
  Cisco switches
   without
  visiting cubicals taking those little umanaged 
  hubs/switches?  Thanks!
   
  Thomas




Message Posted at:

RE: hacking challenge [7:66720]

2003-04-03 Thread Maccubbin, Duncan
Easy, show them RFC 3514 and let them know you would need a firewall to
block the Evil bit...cash, check or charge?

-Original Message-
From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED] 
Sent: Thursday, April 03, 2003 11:46 AM
To: [EMAIL PROTECTED]
Subject: RE: hacking challenge [7:66720]

Wilmes, Rusty wrote:
 
 this is a general question for the security specialists.
 
 Im trying to convince a client that they need a firewall
 
 so hypothetically, 
 
 if you had telnet via the internet open to a router (with an
 access list
 that allowed smtp and telnet) (assuming you didn't know the
 telnet password
 or the enable password)that had a bunch of nt servers on
 another interface,

Do you actually mean that you are allowing Telnet and SMTP to go through
the
router? You said to above which is confusing. Allowing Telnet to the
router unrestricted would be a horrible security hole, even for people
who
don't know the password because passwords are often guessable.

But I don't think that's what you meant...

Allowing Telnet and SMTP through the router is more common, especially
SMTP.
You have to allow SMTP if you have an e-mail server that gets mail from
the
outside world. Avoid Telnet, though, if you can. It sends all text as
clear
text, including passwords.

The question is really how vulnerable is the operating system that the
SMTP
server is running on? It's probably horribly vulnerable if your client
hasn't kept up with the latest patches, and it sounds like your client
is
the type that hasn't? In fact, the server is probably busy attacking the
rest of us right now! ;-0

So, as far as convicing your customer

The best way may be to put a free firewall, like Zone Alarm, on the
decision
maker's computer and show her/him all the attacks happening all the
time. Or
if she already has a firewall, walk her through the log.

Good luck. I have a good book to recommend on this topic:

Greenberg, Eric. Mission-Critical Security Planner. New York, New
York,
Wiley Publishing, Inc., 2003.

Here's an Amazon link:

http://www.amazon.com/exec/obidos/ASIN/0471211656/opendoornetwinc/104-99
01005-4572707

Priscilla

 how long would it take a determined hacker a) cause some kind
 of network
 downtime and b) to map a network drive to a share on a file
 server over the
 internet. 
 
 Thanks,
 Rusty
 
  -Original Message-
  From: Larry Letterman [mailto:[EMAIL PROTECTED]
  Sent: Wednesday, April 02, 2003 1:44 PM
  To: [EMAIL PROTECTED]
  Subject: RE: VLAN loop problem [7:66656]
  
  
  Yes,
  it prevents loops in spanning tree on layer 2 switches from 
  causing a loop
  by disabling the port on a cisco switch...
  
  
  Larry Letterman
  Network Engineer
  Cisco Systems
  
  
  
  
  
   -Original Message-
   From: [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED] Behalf Of
   Thomas N.
   Sent: Wednesday, April 02, 2003 12:18 PM
   To: [EMAIL PROTECTED]
   Subject: Re: VLAN loop problem [7:66656]
  
  
   What does portfast bpdu-guard do?  Does it prevent
 interfaces with
   portfast enabled from causing the loop in my scenario?
  
  
   Larry Letterman  wrote in message
   news:[EMAIL PROTECTED]
  
port mac address security might work, altho its a lot of
 admin
overhead..are you running portfast bpdu-guard on the
 access ports?
   
   
Larry Letterman
Network Engineer
Cisco Systems
   
   
  - Original Message -
  From: Thomas N.
  To: [EMAIL PROTECTED]
  Sent: Tuesday, April 01, 2003 8:14 PM
  Subject: VLAN loop problem [7:66656]
   
   
  Hi All,
   
  I got a problem in the production campus LAN here
 between
   VLANs.  Please
  help me out!  Below is the scenario:
   
  We have VLAN 10 (10.10.x.x) and VLAN 20 (10.20.x.x)
 subnets.
   Routing is
  enable/allowed between the two subnets using MSFC of 
  the 6500.  Each
   subnet
  has a DHCP server to assign IP address to devices on
 its subnet.
  Spanning-tree is enable; however, portfast is turned on
 on all
  non-trunking/uplink ports.  Recently, devices on VLAN
 10 got
   assigned an
   IP
  address of 10.20.x.x , which is from the DHCP on the 
  other scope and
   also
  from 10.10.x.x scope, and vice versa.  It seems that we
 a
   loop somewhere
  between the 2 subnets but we don't know where.  I 
  noticed lots of end
   users
  have a little unmanged hub/switch hang off the network 
  jacks in their
  cubicals and potentially cause loop.
   
  Is there any way that we can block the loop on the 
  Cisco switches
   without
  visiting cubicals taking those little umanaged 
  hubs/switches?  Thanks!
   
  Thomas




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=66770t=66720
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


RE: hacking challenge [7:66720]

2003-04-03 Thread Wilmes, Rusty
there's an access list on the ethernet interface thats directly connected to
a dsl modem.

they're allowing telnet and smpt to basically, any any plus various other
protocols from/to specific addresses.  There're only two outside addresses
that are natted but its really hideous and the access list is the only thing
resembling a layer of security between the internet and their server farm.  

I was just hoping to hear some really good verbage about how vulnerable they
are.  I've told them for 3 months to get a pix but it just aint sinking in.
Now they've got a worm loose on their mail server thats bringing down their
main host system and their internet line (but thats another story).



 -Original Message-
 From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED]
 Sent: Thursday, April 03, 2003 8:46 AM
 To: [EMAIL PROTECTED]
 Subject: RE: hacking challenge [7:66720]
 
 
 Wilmes, Rusty wrote:
  
  this is a general question for the security specialists.
  
  Im trying to convince a client that they need a firewall
  
  so hypothetically, 
  
  if you had telnet via the internet open to a router (with an
  access list
  that allowed smtp and telnet) (assuming you didn't know the
  telnet password
  or the enable password)that had a bunch of nt servers on
  another interface,
 
 Do you actually mean that you are allowing Telnet and SMTP to 
 go through the
 router? You said to above which is confusing. Allowing Telnet to the
 router unrestricted would be a horrible security hole, even 
 for people who
 don't know the password because passwords are often guessable.
 
 But I don't think that's what you meant...
 
 Allowing Telnet and SMTP through the router is more common, 
 especially SMTP.
 You have to allow SMTP if you have an e-mail server that gets 
 mail from the
 outside world. Avoid Telnet, though, if you can. It sends all 
 text as clear
 text, including passwords.
 
 The question is really how vulnerable is the operating system 
 that the SMTP
 server is running on? It's probably horribly vulnerable if your client
 hasn't kept up with the latest patches, and it sounds like 
 your client is
 the type that hasn't? In fact, the server is probably busy 
 attacking the
 rest of us right now! ;-0
 
 So, as far as convicing your customer
 
 The best way may be to put a free firewall, like Zone Alarm, 
 on the decision
 maker's computer and show her/him all the attacks happening 
 all the time. Or
 if she already has a firewall, walk her through the log.
 
 Good luck. I have a good book to recommend on this topic:
 
 Greenberg, Eric. Mission-Critical Security Planner. New 
 York, New York,
 Wiley Publishing, Inc., 2003.
 
 Here's an Amazon link:
 
 http://www.amazon.com/exec/obidos/ASIN/0471211656/opendoornetw
 inc/104-9901005-4572707
 
 Priscilla
 
  how long would it take a determined hacker a) cause some kind
  of network
  downtime and b) to map a network drive to a share on a file
  server over the
  internet. 
  
  Thanks,
  Rusty
  
   -Original Message-
   From: Larry Letterman [mailto:[EMAIL PROTECTED]
   Sent: Wednesday, April 02, 2003 1:44 PM
   To: [EMAIL PROTECTED]
   Subject: RE: VLAN loop problem [7:66656]
   
   
   Yes,
   it prevents loops in spanning tree on layer 2 switches from 
   causing a loop
   by disabling the port on a cisco switch...
   
   
   Larry Letterman
   Network Engineer
   Cisco Systems
   
   
   
   
   
-Original Message-
From: [EMAIL PROTECTED] 
   [mailto:[EMAIL PROTECTED] Behalf Of
Thomas N.
Sent: Wednesday, April 02, 2003 12:18 PM
To: [EMAIL PROTECTED]
Subject: Re: VLAN loop problem [7:66656]
   
   
What does portfast bpdu-guard do?  Does it prevent
  interfaces with
portfast enabled from causing the loop in my scenario?
   
   
Larry Letterman  wrote in message
news:[EMAIL PROTECTED]
   
 port mac address security might work, altho its a lot of
  admin
 overhead..are you running portfast bpdu-guard on the
  access ports?


 Larry Letterman
 Network Engineer
 Cisco Systems


   - Original Message -
   From: Thomas N.
   To: [EMAIL PROTECTED]
   Sent: Tuesday, April 01, 2003 8:14 PM
   Subject: VLAN loop problem [7:66656]


   Hi All,

   I got a problem in the production campus LAN here
  between
VLANs.  Please
   help me out!  Below is the scenario:

   We have VLAN 10 (10.10.x.x) and VLAN 20 (10.20.x.x)
  subnets.
Routing is
   enable/allowed between the two subnets using MSFC of 
   the 6500.  Each
subnet
   has a DHCP server to assign IP address to devices on
  its subnet.
   Spanning-tree is enable; however, portfast is turned on
  on all
   non-trunking/uplink ports.  Recently, devices on VLAN
  10 got
assigned an
IP
   address of 10.20.x.x , which is from the DHCP on the 
   other scope and
also
   from 10.10.x.x scope, and vice versa.  It seems

RE: hacking challenge [7:66720]

2003-04-03 Thread Symon Thurlow
This prompts me to say something about a comment from a previous poster
about how vulnerable Windows is compared to Linux/xBSD etc

I see many, many vulnerability alerts weekly for *nix based systems.
Probably just as many as you see for Windows.

You should of course harden any Internet facing network device, however
the point is not really the type of server OS you run, or the Apps on
it, but how good you are at proactively keeping them patched. 

I suggest that you go to some firewall vendor sites and plagiarise a bit
of marketing guff if you want to sell the firewall idea to a sceptic,
although just plonking a firewall in front of your unpatched sendmail
server won't achieve a great deal.

My 2c, YMMV

Symon



-Original Message-
From: Wilmes, Rusty [mailto:[EMAIL PROTECTED] 
Sent: 03 April 2003 20:05
To: [EMAIL PROTECTED]
Subject: RE: hacking challenge [7:66720]


there's an access list on the ethernet interface thats directly
connected to a dsl modem.

they're allowing telnet and smpt to basically, any any plus various
other protocols from/to specific addresses.  There're only two outside
addresses that are natted but its really hideous and the access list is
the only thing resembling a layer of security between the internet and
their server farm.  

I was just hoping to hear some really good verbage about how vulnerable
they are.  I've told them for 3 months to get a pix but it just aint
sinking in. Now they've got a worm loose on their mail server thats
bringing down their main host system and their internet line (but thats
another story).



 -Original Message-
 From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED]
 Sent: Thursday, April 03, 2003 8:46 AM
 To: [EMAIL PROTECTED]
 Subject: RE: hacking challenge [7:66720]
 
 
 Wilmes, Rusty wrote:
  
  this is a general question for the security specialists.
  
  Im trying to convince a client that they need a firewall
  
  so hypothetically,
  
  if you had telnet via the internet open to a router (with an access 
  list that allowed smtp and telnet) (assuming you didn't know the
  telnet password
  or the enable password)that had a bunch of nt servers on
  another interface,
 
 Do you actually mean that you are allowing Telnet and SMTP to
 go through the
 router? You said to above which is confusing. Allowing Telnet to the
 router unrestricted would be a horrible security hole, even 
 for people who
 don't know the password because passwords are often guessable.
 
 But I don't think that's what you meant...
 
 Allowing Telnet and SMTP through the router is more common,
 especially SMTP.
 You have to allow SMTP if you have an e-mail server that gets 
 mail from the
 outside world. Avoid Telnet, though, if you can. It sends all 
 text as clear
 text, including passwords.
 
 The question is really how vulnerable is the operating system
 that the SMTP
 server is running on? It's probably horribly vulnerable if your client
 hasn't kept up with the latest patches, and it sounds like 
 your client is
 the type that hasn't? In fact, the server is probably busy 
 attacking the
 rest of us right now! ;-0
 
 So, as far as convicing your customer
 
 The best way may be to put a free firewall, like Zone Alarm,
 on the decision
 maker's computer and show her/him all the attacks happening 
 all the time. Or
 if she already has a firewall, walk her through the log.
 
 Good luck. I have a good book to recommend on this topic:
 
 Greenberg, Eric. Mission-Critical Security Planner. New
 York, New York,
 Wiley Publishing, Inc., 2003.
 
 Here's an Amazon link:
 
 http://www.amazon.com/exec/obidos/ASIN/0471211656/opendoornetw
 inc/104-9901005-4572707
 
 Priscilla
 
  how long would it take a determined hacker a) cause some kind of 
  network downtime and b) to map a network drive to a share on a file
  server over the
  internet. 
  
  Thanks,
  Rusty
  
   -Original Message-
   From: Larry Letterman [mailto:[EMAIL PROTECTED]
   Sent: Wednesday, April 02, 2003 1:44 PM
   To: [EMAIL PROTECTED]
   Subject: RE: VLAN loop problem [7:66656]
   
   
   Yes,
   it prevents loops in spanning tree on layer 2 switches from
   causing a loop
   by disabling the port on a cisco switch...
   
   
   Larry Letterman
   Network Engineer
   Cisco Systems
   
   
   
   
   
-Original Message-
From: [EMAIL PROTECTED]
   [mailto:[EMAIL PROTECTED] Behalf Of
Thomas N.
Sent: Wednesday, April 02, 2003 12:18 PM
To: [EMAIL PROTECTED]
Subject: Re: VLAN loop problem [7:66656]
   
   
What does portfast bpdu-guard do?  Does it prevent
  interfaces with
portfast enabled from causing the loop in my scenario?
   
   
Larry Letterman  wrote in message 
news:[EMAIL PROTECTED]
   
 port mac address security might work, altho its a lot of
  admin
 overhead..are you running portfast bpdu-guard on the
  access ports?


 Larry Letterman
 Network Engineer
 Cisco Systems


   - Original

RE: hacking challenge [7:66720]

2003-04-03 Thread Evans, TJ (BearingPoint)
So ... doesn't that give them enough supporting evidence all by itself?
If not, maybe it is a lost cause?

As an aside - a pix, if it was permitting the offending port through as
well, may not have stopped the worm either.  Think Defense in Depth.  A
firewall, while a necessity for -everyone- (IMHO) is not a cure-all; it is a
piece of a very large, very complex puzzle (even for a small network!).

..
Have someone in a Decision-making position there read Hacking __(pick an os
- Windows2k, Linux, etc.), or attend a SANS course (or just visit their
reading room - TONS of articles).  Read Eric Cole's or Ed Skoudis's books.
.. or, teach him/her to use google ... 


Thanks!
TJ
-Original Message-
From: Wilmes, Rusty [mailto:[EMAIL PROTECTED] 
Sent: Thursday, April 03, 2003 2:05 PM
To: [EMAIL PROTECTED]
Subject: RE: hacking challenge [7:66720]

there's an access list on the ethernet interface thats directly connected to
a dsl modem.

they're allowing telnet and smpt to basically, any any plus various other
protocols from/to specific addresses.  There're only two outside addresses
that are natted but its really hideous and the access list is the only thing
resembling a layer of security between the internet and their server farm.  

I was just hoping to hear some really good verbage about how vulnerable they
are.  I've told them for 3 months to get a pix but it just aint sinking in.
Now they've got a worm loose on their mail server thats bringing down their
main host system and their internet line (but thats another story).



 -Original Message-
 From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED]
 Sent: Thursday, April 03, 2003 8:46 AM
 To: [EMAIL PROTECTED]
 Subject: RE: hacking challenge [7:66720]
 
 
 Wilmes, Rusty wrote:
  
  this is a general question for the security specialists.
  
  Im trying to convince a client that they need a firewall
  
  so hypothetically, 
  
  if you had telnet via the internet open to a router (with an
  access list
  that allowed smtp and telnet) (assuming you didn't know the
  telnet password
  or the enable password)that had a bunch of nt servers on
  another interface,
 
 Do you actually mean that you are allowing Telnet and SMTP to 
 go through the
 router? You said to above which is confusing. Allowing Telnet to the
 router unrestricted would be a horrible security hole, even 
 for people who
 don't know the password because passwords are often guessable.
 
 But I don't think that's what you meant...
 
 Allowing Telnet and SMTP through the router is more common, 
 especially SMTP.
 You have to allow SMTP if you have an e-mail server that gets 
 mail from the
 outside world. Avoid Telnet, though, if you can. It sends all 
 text as clear
 text, including passwords.
 
 The question is really how vulnerable is the operating system 
 that the SMTP
 server is running on? It's probably horribly vulnerable if your client
 hasn't kept up with the latest patches, and it sounds like 
 your client is
 the type that hasn't? In fact, the server is probably busy 
 attacking the
 rest of us right now! ;-0
 
 So, as far as convicing your customer
 
 The best way may be to put a free firewall, like Zone Alarm, 
 on the decision
 maker's computer and show her/him all the attacks happening 
 all the time. Or
 if she already has a firewall, walk her through the log.
 
 Good luck. I have a good book to recommend on this topic:
 
 Greenberg, Eric. Mission-Critical Security Planner. New 
 York, New York,
 Wiley Publishing, Inc., 2003.
 
 Here's an Amazon link:
 
 http://www.amazon.com/exec/obidos/ASIN/0471211656/opendoornetw
 inc/104-9901005-4572707
 
 Priscilla
 
  how long would it take a determined hacker a) cause some kind
  of network
  downtime and b) to map a network drive to a share on a file
  server over the
  internet. 
  
  Thanks,
  Rusty
  
   -Original Message-
   From: Larry Letterman [mailto:[EMAIL PROTECTED]
   Sent: Wednesday, April 02, 2003 1:44 PM
   To: [EMAIL PROTECTED]
   Subject: RE: VLAN loop problem [7:66656]
   
   
   Yes,
   it prevents loops in spanning tree on layer 2 switches from 
   causing a loop
   by disabling the port on a cisco switch...
   
   
   Larry Letterman
   Network Engineer
   Cisco Systems
   
   
   
   
   
-Original Message-
From: [EMAIL PROTECTED] 
   [mailto:[EMAIL PROTECTED] Behalf Of
Thomas N.
Sent: Wednesday, April 02, 2003 12:18 PM
To: [EMAIL PROTECTED]
Subject: Re: VLAN loop problem [7:66656]
   
   
What does portfast bpdu-guard do?  Does it prevent
  interfaces with
portfast enabled from causing the loop in my scenario?
   
   
Larry Letterman  wrote in message
news:[EMAIL PROTECTED]
   
 port mac address security might work, altho its a lot of
  admin
 overhead..are you running portfast bpdu-guard on the
  access ports?


 Larry Letterman
 Network Engineer
 Cisco Systems


   - Original Message

Re: hacking challenge [7:66720]

2003-04-03 Thread Scott Roberts
my company does a lot of firewall consulting and I run into this question
all the time. frankly I don't have a great answer for it though.

packet filters (i.e. access-lists) are technically first generation
firewalls, so they do have a firewall in place already.
the sell really comes into play when you state that first generation
firewalls aren't as robust and up-to-date as the latest third generation
firewalls and are open to concerted attacks. this usually they can
understand. trying to explain multilayer stateful inspection to them is
pointless, so don't even try.

probably the best thing you can do (as already sugeested), is make sure your
acl is complete and anytime a security issue comes up point out the problem
as relates to no firewall. after about a year of you doing this, they'll
catch on and will budget it in eventually.

scott


Wilmes, Rusty  wrote in message
news:[EMAIL PROTECTED]
 there's an access list on the ethernet interface thats directly connected
to
 a dsl modem.

 they're allowing telnet and smpt to basically, any any plus various other
 protocols from/to specific addresses.  There're only two outside addresses
 that are natted but its really hideous and the access list is the only
thing
 resembling a layer of security between the internet and their server farm.

 I was just hoping to hear some really good verbage about how vulnerable
they
 are.  I've told them for 3 months to get a pix but it just aint sinking
in.
 Now they've got a worm loose on their mail server thats bringing down
their
 main host system and their internet line (but thats another story).



  -Original Message-
  From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED]
  Sent: Thursday, April 03, 2003 8:46 AM
  To: [EMAIL PROTECTED]
  Subject: RE: hacking challenge [7:66720]
 
 
  Wilmes, Rusty wrote:
  
   this is a general question for the security specialists.
  
   Im trying to convince a client that they need a firewall
  
   so hypothetically,
  
   if you had telnet via the internet open to a router (with an
   access list
   that allowed smtp and telnet) (assuming you didn't know the
   telnet password
   or the enable password)that had a bunch of nt servers on
   another interface,
 
  Do you actually mean that you are allowing Telnet and SMTP to
  go through the
  router? You said to above which is confusing. Allowing Telnet to the
  router unrestricted would be a horrible security hole, even
  for people who
  don't know the password because passwords are often guessable.
 
  But I don't think that's what you meant...
 
  Allowing Telnet and SMTP through the router is more common,
  especially SMTP.
  You have to allow SMTP if you have an e-mail server that gets
  mail from the
  outside world. Avoid Telnet, though, if you can. It sends all
  text as clear
  text, including passwords.
 
  The question is really how vulnerable is the operating system
  that the SMTP
  server is running on? It's probably horribly vulnerable if your client
  hasn't kept up with the latest patches, and it sounds like
  your client is
  the type that hasn't? In fact, the server is probably busy
  attacking the
  rest of us right now! ;-0
 
  So, as far as convicing your customer
 
  The best way may be to put a free firewall, like Zone Alarm,
  on the decision
  maker's computer and show her/him all the attacks happening
  all the time. Or
  if she already has a firewall, walk her through the log.
 
  Good luck. I have a good book to recommend on this topic:
 
  Greenberg, Eric. Mission-Critical Security Planner. New
  York, New York,
  Wiley Publishing, Inc., 2003.
 
  Here's an Amazon link:
 
  http://www.amazon.com/exec/obidos/ASIN/0471211656/opendoornetw
  inc/104-9901005-4572707
 
  Priscilla
 
   how long would it take a determined hacker a) cause some kind
   of network
   downtime and b) to map a network drive to a share on a file
   server over the
   internet.
  
   Thanks,
   Rusty
  
-Original Message-
From: Larry Letterman [mailto:[EMAIL PROTECTED]
Sent: Wednesday, April 02, 2003 1:44 PM
To: [EMAIL PROTECTED]
Subject: RE: VLAN loop problem [7:66656]
   
   
Yes,
it prevents loops in spanning tree on layer 2 switches from
causing a loop
by disabling the port on a cisco switch...
   
   
Larry Letterman
Network Engineer
Cisco Systems
   
   
   
   
   
 -Original Message-
 From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of
 Thomas N.
 Sent: Wednesday, April 02, 2003 12:18 PM
 To: [EMAIL PROTECTED]
 Subject: Re: VLAN loop problem [7:66656]


 What does portfast bpdu-guard do?  Does it prevent
   interfaces with
 portfast enabled from causing the loop in my scenario?


 Larry Letterman  wrote in message
 news:[EMAIL PROTECTED]

  port mac address security might work, altho its a lot of
   admin
  overhead..are you running portfast bpdu-guard

RE: hacking challenge [7:66720]

2003-04-03 Thread Evans, TJ (BearingPoint)
I would have to take issue with the following statement:

You should of course harden any Internet facing network device, however
the point is not really the type of server OS you run, or the Apps on
it, but how good you are at proactively keeping them patched.



-MANY- so-called vulnerabilities are actually by design, we usually call
them features.  This is where the quality of the original coding, the
quality/details of the installation/configuration, and the layers wrapped
around all of this come together. 

Typically, we as users have no control over the coding aspect, aside from
auditing the application in question before deploying it and choosing your
vendor accordingly.

The installation / config is *very* important.  Nearly every vulnerability
would be bypassed if we could just disable all of the services, or leave the
machine without a network connection :).  Code Red and Slammer, to site two
VERY BIG examples, would never have been an issue if the recommended best
practices from the vendor (MS, in this case) had been followed.

Patching, of course, is not to be underrated.  This *REALLY* comes into play
when the vulnerability exists in the services you offer - web services or
SQL, for ex.



I hate to sound repetitive, but the key lies in knowing how to address all
applicable layers and do maintain vigilance in doing so.  Defense in Depth
Thanks!
TJ
-Original Message-
From: Symon Thurlow [mailto:[EMAIL PROTECTED] 
Sent: Thursday, April 03, 2003 4:09 PM
To: [EMAIL PROTECTED]
Subject: RE: hacking challenge [7:66720]

This prompts me to say something about a comment from a previous poster
about how vulnerable Windows is compared to Linux/xBSD etc

I see many, many vulnerability alerts weekly for *nix based systems.
Probably just as many as you see for Windows.

You should of course harden any Internet facing network device, however
the point is not really the type of server OS you run, or the Apps on
it, but how good you are at proactively keeping them patched. 

I suggest that you go to some firewall vendor sites and plagiarise a bit
of marketing guff if you want to sell the firewall idea to a sceptic,
although just plonking a firewall in front of your unpatched sendmail
server won't achieve a great deal.

My 2c, YMMV

Symon



-Original Message-
From: Wilmes, Rusty [mailto:[EMAIL PROTECTED] 
Sent: 03 April 2003 20:05
To: [EMAIL PROTECTED]
Subject: RE: hacking challenge [7:66720]


there's an access list on the ethernet interface thats directly
connected to a dsl modem.

they're allowing telnet and smpt to basically, any any plus various
other protocols from/to specific addresses.  There're only two outside
addresses that are natted but its really hideous and the access list is
the only thing resembling a layer of security between the internet and
their server farm.  

I was just hoping to hear some really good verbage about how vulnerable
they are.  I've told them for 3 months to get a pix but it just aint
sinking in. Now they've got a worm loose on their mail server thats
bringing down their main host system and their internet line (but thats
another story).



 -Original Message-
 From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED]
 Sent: Thursday, April 03, 2003 8:46 AM
 To: [EMAIL PROTECTED]
 Subject: RE: hacking challenge [7:66720]
 
 
 Wilmes, Rusty wrote:
  
  this is a general question for the security specialists.
  
  Im trying to convince a client that they need a firewall
  
  so hypothetically,
  
  if you had telnet via the internet open to a router (with an access 
  list that allowed smtp and telnet) (assuming you didn't know the
  telnet password
  or the enable password)that had a bunch of nt servers on
  another interface,
 
 Do you actually mean that you are allowing Telnet and SMTP to
 go through the
 router? You said to above which is confusing. Allowing Telnet to the
 router unrestricted would be a horrible security hole, even 
 for people who
 don't know the password because passwords are often guessable.
 
 But I don't think that's what you meant...
 
 Allowing Telnet and SMTP through the router is more common,
 especially SMTP.
 You have to allow SMTP if you have an e-mail server that gets 
 mail from the
 outside world. Avoid Telnet, though, if you can. It sends all 
 text as clear
 text, including passwords.
 
 The question is really how vulnerable is the operating system
 that the SMTP
 server is running on? It's probably horribly vulnerable if your client
 hasn't kept up with the latest patches, and it sounds like 
 your client is
 the type that hasn't? In fact, the server is probably busy 
 attacking the
 rest of us right now! ;-0
 
 So, as far as convicing your customer
 
 The best way may be to put a free firewall, like Zone Alarm,
 on the decision
 maker's computer and show her/him all the attacks happening 
 all the time. Or
 if she already has a firewall, walk her through the log.
 
 Good luck. I have a good book to recommend

Re: hacking a firewall [7:34978]

2002-02-18 Thread Hehdili Nizar

look to some sites as :
www.cert.org
www.packetstormattack.com
www.securityfocus.com

to get some procedures for testing firewall installations , otherwise you
must get in touch with experts to evaluate your configuration and the
vulnirability degree of your firewall.
there are also some remote scanning tools , in internet from security
websites.
sami natour  a icrit dans le message news:
[EMAIL PROTECTED]
 Hi ,
 I am trying to test how secure BigFire firewall.I need
 to run some tests in other words I want to find if I
 can hack it or not.It is very important to our company
 to know how secure it is .

 Best Regards ,
 sami ,


 __
 Do You Yahoo!?
 Send FREE Valentine eCards with Yahoo! Greetings!
 http://greetings.yahoo.com




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=35759t=34978
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: hacking a firewall [7:34978]

2002-02-10 Thread Allen May

Your best bet is to look up specs  reviews online from other experts  not
depend on your own tests based on limited information about the firewall.
Remembera firewall is only as good as it's configuration.  They DO allow
mistakes in configuration.  Search on google.com  you will probably find
what you're looking for.

Also...hacking a firewall can mean several things.  Do you mean telnet or
ssh accessibility?  Or are you talking about gaining access to servers from
outside passing through the firewall?

One last thing...don't depend on a firewall to be all the security you need.
It's only the first line of defense.  Servers of all OS types having the
vulnerability is the reason ports need to be blocked in the first place.
Research securing the servers  keep yourself informed with security mailing
lists.

I did a little research and either this page is outdated or they haven't
implemented IPSec/IKE on that thing yet.  It still says 3rd Quarter 2001 it
will be addedbut doesn't say it has yet anywhere else on their home
page.  Also...I'm a little weary of advertising claiming to be infinitely
more secure than other firewalls ;)

http://www.biodata.com/us/products/bigfire/biodata_bigfire.cphtml



 sami natour  wrote in message
 [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
  Hi ,
  I am trying to test how secure BigFire firewall.I need
  to run some tests in other words I want to find if I
  can hack it or not.It is very important to our company
  to know how secure it is .
 
  Best Regards ,
  sami ,
 
 
  __
  Do You Yahoo!?
  Send FREE Valentine eCards with Yahoo! Greetings!
  http://greetings.yahoo.com




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=35030t=34978
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: hacking a firewall [7:34978]

2002-02-09 Thread Godswill HO

O boy user Network Scanner na?

Regards.
- Original Message -
From: sami natour 
To: 
Sent: Saturday, February 09, 2002 12:13 PM
Subject: hacking a firewall [7:34978]


 Hi ,
 I am trying to test how secure BigFire firewall.I need
 to run some tests in other words I want to find if I
 can hack it or not.It is very important to our company
 to know how secure it is .

 Best Regards ,
 sami ,


 __
 Do You Yahoo!?
 Send FREE Valentine eCards with Yahoo! Greetings!
 http://greetings.yahoo.com
_
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=35003t=34978
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Hacking!!!!!!!!!!!!!!!!!!!!!

2001-02-09 Thread JCoyne

Read the book Hacking Exposed 2nd edition.


"imran obaidullah" [EMAIL PROTECTED] wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
 htmlDIVHi Friends,/DIV
 DIVnbsp;/DIV
 DIVI need some information on hacking which is surely to gain knowledge
and secure my corporate n/w. My office has Cisco 3600 Router for internet
connaction. /DIV
 DIVnbsp;/DIV
 DIV1. How can someone hack the Router./DIV
 DIV2. If internet uses is trying to hack webserver using a hacking tool
which is usingnbsp;port 80, how the administrator can block this action
still allowing the trusted users to access the webserver./DIV
 DIVnbsp;/DIV
 DIVThanks and Regards/DIV
 DIVnbsp;/DIV
 DIVimran/DIV
 DIVnbsp;/DIV
 DIVnbsp;/DIVbr clear=allhrGet Your Private, Free E-mail from MSN
Hotmail at a
href="http://www.hotmail.com"http://www.hotmail.com/a.br/p/html

 _
 FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Hacking!!!!!!!!!!!!!!!!!!!!!

2001-02-09 Thread Watson, Rick, CTR, OUSDC

Can you say NIDS? A must have for a multilayer security posture.
Security does not start, or end for that matter with just a firewall..!!

-Original Message-
From: JCoyne [mailto:[EMAIL PROTECTED]]
Sent: Friday, February 09, 2001 7:55 AM
To: [EMAIL PROTECTED]
Subject: Re: Hacking!


Read the book Hacking Exposed 2nd edition.


"imran obaidullah" [EMAIL PROTECTED] wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
 htmlDIVHi Friends,/DIV
 DIVnbsp;/DIV
 DIVI need some information on hacking which is surely to gain knowledge
and secure my corporate n/w. My office has Cisco 3600 Router for internet
connaction. /DIV
 DIVnbsp;/DIV
 DIV1. How can someone hack the Router./DIV
 DIV2. If internet uses is trying to hack webserver using a hacking tool
which is usingnbsp;port 80, how the administrator can block this action
still allowing the trusted users to access the webserver./DIV
 DIVnbsp;/DIV
 DIVThanks and Regards/DIV
 DIVnbsp;/DIV
 DIVimran/DIV
 DIVnbsp;/DIV
 DIVnbsp;/DIVbr clear=allhrGet Your Private, Free E-mail from MSN
Hotmail at a
href="http://www.hotmail.com"http://www.hotmail.com/a.br/p/html

 _
 FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Hacking!!!!!!!!!!!!!!!!!!!!!

2001-02-09 Thread Luke

Rick,

PMI (pardon my ignorance), I can say it as well as spell it but what the
hell is it and where can I get some.  TIA.

""Watson, Rick, CTR, OUSDC"" [EMAIL PROTECTED] wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
 Can you say NIDS? A must have for a multilayer security posture.
 Security does not start, or end for that matter with just a firewall..!!

 -Original Message-
 From: JCoyne [mailto:[EMAIL PROTECTED]]
 Sent: Friday, February 09, 2001 7:55 AM
 To: [EMAIL PROTECTED]
 Subject: Re: Hacking!


 Read the book Hacking Exposed 2nd edition.


 "imran obaidullah" [EMAIL PROTECTED] wrote in message
 [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
  htmlDIVHi Friends,/DIV
  DIVnbsp;/DIV
  DIVI need some information on hacking which is surely to gain
knowledge
 and secure my corporate n/w. My office has Cisco 3600 Router for internet
 connaction. /DIV
  DIVnbsp;/DIV
  DIV1. How can someone hack the Router./DIV
  DIV2. If internet uses is trying to hack webserver using a hacking
tool
 which is usingnbsp;port 80, how the administrator can block this action
 still allowing the trusted users to access the webserver./DIV
  DIVnbsp;/DIV
  DIVThanks and Regards/DIV
  DIVnbsp;/DIV
  DIVimran/DIV
  DIVnbsp;/DIV
  DIVnbsp;/DIVbr clear=allhrGet Your Private, Free E-mail from
MSN
 Hotmail at a
 href="http://www.hotmail.com"http://www.hotmail.com/a.br/p/html
 
  _
  FAQ, list archives, and subscription info:
 http://www.groupstudy.com/list/cisco.html
  Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
 


 _
 FAQ, list archives, and subscription info:
 http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

 _
 FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Hacking!!!!!!!!!!!!!!!!!!!!!

2001-02-09 Thread Stanfield Hilman B (Brad) CONT NSSG

Network Intrusion Detection Systems
Available most anywhere security solutions are sold.


Brad Stanfield CCNA/CCDA
Network/Integration Engineer
[EMAIL PROTECTED]
Government Micro Resources
 Network Operations Control Center
Norfolk Naval Shipyard
Bldg 33 NAVSEA NCOE
757-393-9526
1-800-626-6622




-Original Message-
From: Luke [mailto:[EMAIL PROTECTED]]
Sent: Friday, February 09, 2001 10:43 AM
To: [EMAIL PROTECTED]
Subject: Re: Hacking!


Rick,

PMI (pardon my ignorance), I can say it as well as spell it but what the
hell is it and where can I get some.  TIA.

""Watson, Rick, CTR, OUSDC"" [EMAIL PROTECTED] wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
 Can you say NIDS? A must have for a multilayer security posture.
 Security does not start, or end for that matter with just a firewall..!!

 -Original Message-
 From: JCoyne [mailto:[EMAIL PROTECTED]]
 Sent: Friday, February 09, 2001 7:55 AM
 To: [EMAIL PROTECTED]
 Subject: Re: Hacking!


 Read the book Hacking Exposed 2nd edition.


 "imran obaidullah" [EMAIL PROTECTED] wrote in message
 [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
  htmlDIVHi Friends,/DIV
  DIVnbsp;/DIV
  DIVI need some information on hacking which is surely to gain
knowledge
 and secure my corporate n/w. My office has Cisco 3600 Router for internet
 connaction. /DIV
  DIVnbsp;/DIV
  DIV1. How can someone hack the Router./DIV
  DIV2. If internet uses is trying to hack webserver using a hacking
tool
 which is usingnbsp;port 80, how the administrator can block this action
 still allowing the trusted users to access the webserver./DIV
  DIVnbsp;/DIV
  DIVThanks and Regards/DIV
  DIVnbsp;/DIV
  DIVimran/DIV
  DIVnbsp;/DIV
  DIVnbsp;/DIVbr clear=allhrGet Your Private, Free E-mail from
MSN
 Hotmail at a
 href="http://www.hotmail.com"http://www.hotmail.com/a.br/p/html
 
  _
  FAQ, list archives, and subscription info:
 http://www.groupstudy.com/list/cisco.html
  Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
 


 _
 FAQ, list archives, and subscription info:
 http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

 _
 FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Hacking!!!!!!!!!!!!!!!!!!!!!

2001-02-09 Thread Watson, Rick, CTR, OUSDC

Network Intrusion Detection System - when looking to evaluate a product look
at both host-based and network-based solutions. Each type compliments one
another. I can remember only one product that is a "quasi-hybrid" mix of
both host and network-based. I think it is from ISS (Internet Security
Systems).

-Original Message-
From: Luke [mailto:[EMAIL PROTECTED]]
Sent: Friday, February 09, 2001 10:43 AM
To: [EMAIL PROTECTED]
Subject: Re: Hacking!


Rick,

PMI (pardon my ignorance), I can say it as well as spell it but what the
hell is it and where can I get some.  TIA.

""Watson, Rick, CTR, OUSDC"" [EMAIL PROTECTED] wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
 Can you say NIDS? A must have for a multilayer security posture.
 Security does not start, or end for that matter with just a firewall..!!

 -Original Message-
 From: JCoyne [mailto:[EMAIL PROTECTED]]
 Sent: Friday, February 09, 2001 7:55 AM
 To: [EMAIL PROTECTED]
 Subject: Re: Hacking!


 Read the book Hacking Exposed 2nd edition.


 "imran obaidullah" [EMAIL PROTECTED] wrote in message
 [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
  htmlDIVHi Friends,/DIV
  DIVnbsp;/DIV
  DIVI need some information on hacking which is surely to gain
knowledge
 and secure my corporate n/w. My office has Cisco 3600 Router for internet
 connaction. /DIV
  DIVnbsp;/DIV
  DIV1. How can someone hack the Router./DIV
  DIV2. If internet uses is trying to hack webserver using a hacking
tool
 which is usingnbsp;port 80, how the administrator can block this action
 still allowing the trusted users to access the webserver./DIV
  DIVnbsp;/DIV
  DIVThanks and Regards/DIV
  DIVnbsp;/DIV
  DIVimran/DIV
  DIVnbsp;/DIV
  DIVnbsp;/DIVbr clear=allhrGet Your Private, Free E-mail from
MSN
 Hotmail at a
 href="http://www.hotmail.com"http://www.hotmail.com/a.br/p/html
 
  _
  FAQ, list archives, and subscription info:
 http://www.groupstudy.com/list/cisco.html
  Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
 


 _
 FAQ, list archives, and subscription info:
 http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

 _
 FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Hacking (header omitted)

2000-12-15 Thread Martin-Guy Richard

Hello all,

Question for you, does Cisco support TCP Rate Control or TCP Flow Control?

MGR

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Hacking

2000-11-29 Thread Howard C. Berkowitz

David Binder wrote,



I think Hacking is a very interesting topic but there is something I want
to mention. I think Haking and Hackers have a positive aspect too, if they
dont want do harm you (otherwise they would be called crackers).
If a Hacker broke into your system and shows you that your security system
is not good, you will have to work on it. So you will have a better
security system and this protects you from people who really want to harm you.
Software engineers and producers of firewalls will also have to work on
it. So the Internet will get more safe.
I agree with you when you say that it is a vicious circle but that is the
same in real life too.


Consider the following scenario, that takes place in a country 
without universal and unlimited health care. Someone walking on a 
public street is stopped by a wild-eyed, stethoscope-wielding person 
in a white coat. The white-coated one screams that he has observed 
that the passerby has yellow eyes, spider-shaped blood vessels under 
the skin, fluid retention in the legs, is trembling and seems to be 
itching intolerably.

"You have innumerable symptoms of advanced liver disease. That is not 
good. Your liver wishes to harm you and must immediately be replaced 
with a transplant."

And the innocent one says "I have no money for food.  If I do not 
eat, the state of my liver will be irrelevant."

Let me try to put this into philosophical rather than metaphorical 
terms.  The doctor, in my metaphor, regards the state of one's liver 
as an absolute good.  Those hackers that claim they are doing a favor 
for individuals and organizations, by probing every aspect of their 
security, base their claims on that security against active probes is 
an absolute good, and that the target of their probe can guard 
against the attacks.

Assume that one of the targets of the probe is a community health 
center in a remote rural area. That center has limited funds.  Due to 
its remote location, electrical power is not reliable.  With finite 
resources, the center may make a decision that it is more important 
to buy a backup electrical generator than to allocate those resources 
to install a firewall.

In the clinic example, I will assume that its system administrator is 
infinitely knowledgeable in security and security tradeoffs, and has 
made a conscious decision that the risks of not having electricity 
are more severe than the risks of breakins.   Does that administrator 
have an obligation to tell the hackers why he implemented a certain 
policy? What responsibility do the hackers--and I will assumed they 
are well intentioned--have to the system administrator?  That 
administrator may have detected a breakin, and not know if it is 
malicious or not.  Under such circumstances, a reasonable 
administrator is forced to spend resources to restore potentially 
damaged files. He cannot trust the word of the hacker, because they 
are anonymous and unsolicited. No relationship of trust exists 
between hacker and organization being hacked.

For sake of argument, the clinic administrator is assumed to be a 
security expert.  In the real world, only larger enterprises will 
have in-house security staff.  Properly supporting a firewall is not 
a trivial task--I've done it, and simply staying aware of published 
new threats and installing protections against them requires 
significant effort.

To me, there is a significant ethical difference between:

 a hacker that experiments on her own machines that run Microsoft 
software, finds a vulnerability, and notifies both Microsoft and 
independent organizations  (i.e., http://www.cert.org) of the 
vulnerability and how to protect against it

 a hacker who invades a small business system and leaves a note saying

 "I am an Elite Hacker D00D who got in through your lousy security.
  Fix it. I could have left a bomb, but trust me, I didn't."

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Hacking (header omitted)

2000-11-29 Thread Howard C. Berkowitz

Accidentally posted to groupstudy rather than cyberphil, but perhaps 
of interest.

I think Hacking is a very interesting topic but there is something I want
to mention. I think Haking and Hackers have a positive aspect too, if they
dont want do harm you (otherwise they would be called crackers).
If a Hacker broke into your system and shows you that your security system
is not good, you will have to work on it. So you will have a better
security system and this protects you from people who really want to harm you.
Software engineers and producers of firewalls will also have to work on
it. So the Internet will get more safe.
I agree with you when you say that it is a vicious circle but that is the
same in real life too.


Consider the following scenario, that takes place in a country 
without universal and unlimited health care. Someone walking on a 
public street is stopped by a wild-eyed, stethoscope-wielding person 
in a white coat. The white-coated one screams that he has observed 
that the passerby has yellow eyes, spider-shaped blood vessels under 
the skin, fluid retention in the legs, is trembling and seems to be 
itching intolerably.

"You have innumerable symptoms of advanced liver disease. That is not 
good. Your liver wishes to harm you and must immediately be replaced 
with a transplant."

And the innocent one says "I have no money for food.  If I do not 
eat, the state of my liver will be irrelevant."

Let me try to put this into philosophical rather than metaphorical 
terms.  The doctor, in my metaphor, regards the state of one's liver 
as an absolute good.  Those hackers that claim they are doing a favor 
for individuals and organizations, by probing every aspect of their 
security, base their claims on that security against active probes is 
an absolute good, and that the target of their probe can guard 
against the attacks.

Assume that one of the targets of the probe is a community health 
center in a remote rural area. That center has limited funds.  Due to 
its remote location, electrical power is not reliable.  With finite 
resources, the center may make a decision that it is more important 
to buy a backup electrical generator than to allocate those resources 
to install a firewall.

In the clinic example, I will assume that its system administrator is 
infinitely knowledgeable in security and security tradeoffs, and has 
made a conscious decision that the risks of not having electricity 
are more severe than the risks of breakins.   Does that administrator 
have an obligation to tell the hackers why he implemented a certain 
policy? What responsibility do the hackers--and I will assumed they 
are well intentioned--have to the system administrator?  That 
administrator may have detected a breakin, and not know if it is 
malicious or not.  Under such circumstances, a reasonable 
administrator is forced to spend resources to restore potentially 
damaged files. He cannot trust the word of the hacker, because they 
are anonymous and unsolicited. No relationship of trust exists 
between hacker and organization being hacked.

For sake of argument, the clinic administrator is assumed to be a 
security expert.  In the real world, only larger enterprises will 
have in-house security staff.  Properly supporting a firewall is not 
a trivial task--I've done it, and simply staying aware of published 
new threats and installing protections against them requires 
significant effort.

To me, there is a significant ethical difference between:

 a hacker that experiments on her own machines that run Microsoft 
software, finds a vulnerability, and notifies both Microsoft and 
independent organizations  (i.e., http://www.cert.org) of the 
vulnerability and how to protect against it

 a hacker who invades a small business system and leaves a note saying

 "I am an Elite Hacker D00D who got in through your lousy security.
  Fix it. I could have left a bomb, but trust me, I didn't."

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]