Re: [Full-Disclosure] PIX vs CheckPoint

2004-06-30 Thread B3r3n
At 10:29 30/06/2004, Cyril Guibourg wrote: AFAIK, a PIX can operate without NAT. Did I miss something ? Yes, NAT can be disabled on Pix. See the 'nat' command. Simply put the appropriate line syntax and it will behaves as a normal Firewall. But only behaves because no routing daemon, and Pix

Re: [Full-Disclosure] PIX vs CheckPoint

2004-06-29 Thread B3r3n
Hi DarkSlaker At 20:24 29/06/2004, Darkslaker wrote: My question is PIX or Checkpoint what is better and why. I dont think I am not skilled enough to provide you an answer about this. However, I have both solutions under my authority and I can feedback about a few things: First CheckPoint (NG4)

[Full-Disclosure] Fwd: Alert: IIS compromised to place footer JavaScript on each page

2004-06-25 Thread B3r3n
FYI There have been several reports of IIS servers being compromised in a similar fashion. The result is that each has a document footer specified which is JavaScript which causes the viewing browser to load a page from a malicious website. The loaded page installs a trojan via one of several

Re: [Full-Disclosure] Unusual behaviour of PIX

2004-02-16 Thread B3r3n
Azhar, Did you checked the security levels values associated with each interface? Brgrds ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] Re: [Full-Disclosure] http://federalpolice.com:article872@1075686747

2004-02-15 Thread B3r3n
I confirm... Another SPAMmer simply... At 17:45 15/02/2004, Lee wrote: I have been getting the below mail from numerous email sources all day, can anyone else confirm this mail is flying around? Regards From :

Re: [Full-Disclosure] Windows 2000 Source code .torrent

2004-02-13 Thread B3r3n
Joel, Click here, then OPEN the file: http://torrent.spyderlake.com/download.php?info_hash=f03fc1e04869294d5644d3c8c5d0fb8f2d26aa59 If you aren't familiar with Bit Torrent, Shame on you. Download it here: http://bitconjurer.org/BitTorrent/ I would like to recall 99% of what peer to peer tools

Re: [Full-Disclosure] Good Antivirus solution for Solaris 9.0

2003-11-05 Thread B3r3n
Nester, Can you please advise any good Antivirus product for the SUN Solaris platform. Cant tell if it is good, but NAI/McAfee has a version of their Antivirus for Solaris, FreeBSD, Linux, ... Brgrds ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-Disclosure] Rootkit

2003-09-26 Thread B3r3n
Hi Dave, Just my 2 cents advice. Can anyone recommend a good scanner or info site where I can compare some of the binaries I saved (the machine has been wiped)? The first thing I do to scan filesystems suspected of being intruded is to launch against them (from remote or booting on CD, ...) an

RE: [Full-Disclosure] Scanning the PCs for RPC Vulnerability

2003-09-03 Thread B3r3n
Paul, What do you mean by this? I haven't used the Foundstone tool, but are you saying that the MS tool puts IPs of Win9x/ME hosts on the list of vulnerable hosts? Yes, we experimented that ourselves too. MS Scanning tools is 100% true for NT, 2K XP machines. It answers unpatched for Win9x

Re: [Full-Disclosure] sans.org

2003-09-02 Thread B3r3n
From France, sans.org resolves ok but not www.incidents.org # dig www.incidents.org ; DiG 8.3 www.incidents.org ;; res options: init recurs defnam dnsrch ;; got answer: ;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 2 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0 ;;

[Full-Disclosure] How to massively remove DCOM RPC Worms

2003-08-30 Thread B3r3n
Hi Gentlemen, Following the article http://www.securityfocus.com/archive/119/333927, I applied this principle on our IntraNet. I used the oc192-dcom proof of concept code from securityfocus too. I create a ms.bat script placed into the startup group (c:\documents and setting\all

[Full-Disclosure] ping floods

2003-08-18 Thread B3r3n
All, We are experienced some ping floods on our IntraNet with decoys. this DoS LANs for a few minutes, and restarts again later. Is someone having this problem too? Thanks Brgrds ___ Full-Disclosure - We believe in it. Charter:

[Full-Disclosure] [UPDATE] ping floods

2003-08-18 Thread B3r3n
All, What we have here at the moment is the following: 1) IntraNet machines are pinging to random IP addresses (both targetting our IntraNet and outside) 2) From time to time, when a particular machine is pinging from a subnet, it appears some new machines on that subnet are starting to ping

[Full-Disclosure] [UPDATE] ping floods!! Nachi Worm!

2003-08-18 Thread B3r3n
All, Here is our nemesis: W32/Nachi Worm. See www.nai.com Brgrds ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] [UPDATE] ping floods

2003-08-18 Thread B3r3n
Well I guess it would appear from this portion of NAI's analysis that someone was listening to the thread on this list about writing an anti-blaster worm: In fact, we were infected this morning with this worm and we sent it to NAI since we are using their products. NAI's reaction: what are

Re: [Full-Disclosure] [UPDATE] ping floods

2003-08-18 Thread B3r3n
anybody catched a copy of this new worm? We have plenties on our internal network ;-) @+ ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] DDos counter measures

2003-08-15 Thread B3r3n
Matt, FYI - we tried this with the worm and it *doesn't* work. msblast.exe spoofed the source address as the loopback address handed out from our DNS. We instead created an empty windowsupdate.com zone. It worked fine for us after multiple tests. But thanks for the info, we have alternate

RE: [Full-Disclosure] msblast DDos counter measures (More Insight Maybe?)

2003-08-15 Thread B3r3n
, Christopher Lyon Affant Communication (formerly DNS Network Services) [EMAIL PROTECTED] -Original Message- From: Marc Maiffret [mailto:[EMAIL PROTECTED] Sent: Thursday, August 14, 2003 2:58 PM To: B3r3n; [EMAIL PROTECTED] Subject: RE: [Full-Disclosure] msblast DDos counter measures Yah

Re: [Full-Disclosure] DDos counter measures

2003-08-15 Thread B3r3n
Gael, Try some other tests using no A record for windowsupdate.com in your local zone, you will notice that the damages are even smaller doing that instead of localhost (127.0.0.1). We also tested this solution to answer nothing to query as with an unresolved domain. But finally the solution

[Full-Disclosure] msblast DDos counter measures

2003-08-14 Thread B3r3n
All, We found a simple solution to protect our IntraNet against the DDoS. Since the msblast.exe will SYN flood windowsupdate.com (or windowsupdate.microsoft.com) with 50 packets per second (according to our tests). Since our IntraNet solves all its DNS queries through internal caches

Re: [Full-Disclosure] Security Certifications

2003-03-07 Thread B3r3n
Guys, Never read the CISSP trojan? Nice no? _ Security Advisory MA-2003-01 CISSP - Trojan Security Certification Original Release Date: Thursday January 16, 2003 Last Revised: -- Source: -- Systems Affected o Information Security Community