Looking at some suspicious behaviour in our logs...
If someone sends a packet with the SYN bit set to a host, typically what is
the client's source port? Or is that crafted too?
And additionally, when a client does sent a packet of this type, am I right
in assuming its generally TCP only? Can
So whats the difference between a SYN/FIN scan as opposed to a SYN/ACK scan?
Please.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
I just finished reading a book Corporate Computer and Network Security -
Raymond R. Panko.
He states that the CSI/FBI surveys suggest that wiretapping is rare. Should
companies still be concerned with Wiretapping?
___
Full-Disclosure - We believe in it.
In our IDS logs, I notice many outgoing packets coming from port 80 (HTTP).
These packets are coming from client PCs. What may be happening?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and
Is the following URL valid? http://[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
, 2007 9:08 PM
Subject: From Remittance Department
To: [EMAIL PROTECTED]
From Remittance Department
Tel:+31 619 289 644
Fax:+31 619 289 645
sns Bank
Marienplaatz 78,
5291HM,Den Haag
The Netherlands
Date:16th-10-2007.
Dear Kelly Robinson,
Your email has been awarded a lump sum pay-out from the free
In the Control Field of a TCP segment I noticed the following values:
URG 0
ACK 0
PSH 0
RST 0
SYN 1
FIN 1
I assume the checksum is OK, is this an attack packet? If not, why not? If
so, what is the attacker probably trying to achieve?
___
*Why should technology be the final tier to be fully implemented in a
security program?*
**
I am thinking in terms of the Digital Liability Management model:
http://daemonic.wordpress.com/2006/04/26/it-security/
___
Full-Disclosure - We believe in it.
It is common these days for email messages to contain a disclosure notice,
which may include statements such as:
- You must read the notice
- The views expressed in the accompanying email are not necessarily
those of the company
- The email and any attachments should be
Thank you so much for the input everyone, its really appreciated.
I have read so much about Disclaimers being a sense of false security and
how they dont hold any legal binding per se. However, given other rumours
about how emails can be used in court for the sake of evidence (Looking for
An MS Word file on your computer has a size of 356 KB and a *modified* date
of 19 June 2007 3:37:51 PM. Moreover, the file has been certified clean (i.e.,
uninfected) at this point by an infallible AV scanner.
After a highly-publicised virus outbreak, you examine this file's properties
again and
11 matches
Mail list logo