[Full-disclosure] [OOT] VPN Benchmark
Hi All, I just want to know if there is a VPN Benchmark application that can be used to do following tasks : 1. Emulate 4k users 2. Login to VPN over PPTP or L2TP 3. Emulate browsing activity Maybe someone knows? My most important target is to know how many client can be logged in on my current VPN server. Thank you. Fajar ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Hackers uniting against Iran?
this is the funniest email from this mailing list..., good luck then for you. It's not fun to use religion as permission for starting something bad for other religion. you must learn the respect other believers. On 4/5/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: "United Hackers" <[EMAIL PROTECTED]> wrote sometime: (sucking logo) > We, the Hackers United against the Threat of Islam to the Freedom of > Thought and Peace are hereby declaring open war against the evils of > Islam. The axis of evil must be stopped and destroyed. then get a rifle and kill bush and his junta. then proceed... thanks in advance. > The United > States of America is planning a demonstration of military force > against the evil nation of Iran. it has been known for weeks now that this is planned for months, as well as the israel invasion of lebanon was ([0], [1], etc) with their fundamental christians' idiotic belief in 'armageddon'. > As of the moment of this > announcement, a Cyber War has been declared against Iran. We do this > to assit the United States of America in their war against the evils > of Islam. > > The first operation in this war was the secretive Operation Screaming > Eagle. This has been an ongoing preparation for battle, mapping out > critical Internet infrastructure to the Nation of Iran, as well as > determining passwords, access codes and vulnerable attack vectors for > gaining access to Iranian systems, including routers and servers. you mean that half a dozen T1 lines over there? l33t! > Many Iranian machines have backdoors installed, and many routers have > been broken into had have had their login security mechanisms > comprimised. > > At dawn of April 06, 2007, the Hackers United against the Threat of > Islam shall initiate the largest, multinational, coordinated attack > against a nation's infrastructure ever witnessed. Hackers from the > United States of America, okay, the US is pretty well known for war: native americans, korea, vietnam, iraq, iraq, afghanistan, iraq, iran and the many many forgotten wars. > Great Britain, "I'm with stupid" -- a great song! > Norway, France, Italy, > Brazil, brazil never started a war. why should they do now? in contrast to the US, they do NOT suck. > Germany started two world wars, never 'succeeded' the way they intended (kudos to the red army :) > and Russia will launch attacks against Iran's > infrastructure, russia? help the US? in 2007? ROTFL! > disabling all IP-based communication and facilitating > attacks against their terrorist targets. blahblahblah > Islam must be stopped. And the Hackers United against the Threat of > Islam are there to do the job. canada must be stopped! [2] this is real evil stuff! nuke canada! > Shout outs to everyone united against Islam. We stand together to > face this threat to humanity. the threat to humanity is capitalism as it makes 100,000+ human beings die of hunger every day and spreads wars, poison and evil all over the planet. it's like cancer. [0] -- http://www.commondreams.org/archive/2007/03/28/150/ [1] -- http://www.911blogger.com/node/5931 [2] -- http://www.stopthesealhunt.ca -- "Feel free" - 10 GB Mailbox, 100 FreeSMS/Monat ... Jetzt GMX TopMail testen: http://www.gmx.net/de/go/topmail ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [OOT] Intrusion Prevention System Impelementation Methodology
Hello All, I'm trying to find methodology for implementing intrusion prevention system in my report. I'm reading about an improvement for system development life cycle for information security. But it's really complicated for just a guide how to implement intrusion prevention. Maybe someone willing here can't help me? I'm really frustated here... Thanks ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] [OOT] Thesis for master degree
thanks all for the hint. phew, i hope i can do my thesis very soon. daily job as system and network administrator really take my day. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [OOT] Thesis for master degree
Hello everyone, sorry for wasting your bandwidth I'm currently trying to find an interesting topic in computer networking security for my master degree thesis, I've read a lot of jurnal that related with computer networking and security. All journal seem to advanced for me, sometimes the journal has mathematical formula that I don't understand what is the point for. Maybe someone here willing to help me? an idea? or another journal website? Thanks Sincerely yours Fajar ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] SSH Scans - Homebrew dictionary
how about using sshdfilter, it's working fine with me ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] ADVISORY # =Thu Mar 16 21:04:15 EST 2006= # Heap Overflow in Microsoft PowerPoint
ADVISORY # =Thu Mar 16 21:04:15 EST 2006= # Heap Overflow in Microsoft PowerPoint --- 8===D Background This vulnerability has no identified background. --- 8===D Description It is possible to make Microsoft PowerPoint crash or run arbitrary code by the use of malformed input. --- 8===D Vendor Response Microsoft PowerPoint is offered no explanation regarding this problem. --- 8===D CVE Information The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-179265 to this issue --- Appendix A Vendor Information http://www.microsoft.com --- Appendix B References RFC 7212 --- Contact Fajar Edisya Putera [EMAIL PROTECTED] 1-888-565-9428 BEWARE THE JIZZTAPO!!! .. _ .' `. /\) / / / / /\ \ \ / \ _ \ \/ /\ \ (/\ \ / \ \ \ \ / \ (Y ) \ \/ /\ \ "" \ / \ \ \/ / / / / ( Y) "" CCE SSP-CNSA SSP-MPA GIPS GHTQ GWAS SSCP ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [Advisory] - x Thu Mar 16 14:29:32 EST 2006 x - Local Privilege Escalation Vulnerability in ISC BIND
[Advisory] - x Thu Mar 16 14:29:32 EST 2006 x - Local Privilege Escalation Vulnerability in ISC BIND [+] DESCRIPTION ISC BIND incorrectly validates user input, making privilege escalation possible. APPENDIX A VENDOR INFORMATION http://www.isc.org/index.pl?/sw/bind/ APPENDIX B REFERENCES RFC 2164 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Suggestion for IDS
Dear Experts, Our company plan to install IDS to protect our resources, I'm already read about snort as NIDS, but, that's software based. I'm interesting with hardware based that will work transparently with our Cisco PIX, no need to make changes in our firewall. What's your suggestion. Thanks Fajar ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/