Bravo, Radule, bravo.
Your story started my Friday with weekend plans to finally scrap xp at
home for my attempt at SuSE.
Thank you in advance.
At least one changed user,
-Jeff Parker
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Radule
Soskic
Sent: F
N, Gideon,
Not sure if this is what you're looking for, but SANS Institute offers a
few certifications that seem to match pretty well.
The first is their GSNA credential: "GIAC Systems and Network Auditing."
(Track 7)
The second one is "Security Consultant" (Track 13), which covers ISO
17799.
Las
Umer,
Running p0f does not necessarily offer a stimulus/response test.
Regarding detecting a machine with p0f installed/running, you may have
better success simply trying to detect for any network adapter in
promiscuous mode. And there's tons of info available on that...
HTH,
-jeff parker
Title: Message
mental
note to self: "six exclamation points does not necessarily denote shared
enthusiasm on full-disclosure list"
:)
-Original Message-From:
[EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Gaurav
KumarSent: Friday, August 22, 2003 2:48 PMTo:
Please do not forget port 593/tcp and 593/udp.
If you (or someone else) heard something about the vulnerability working
over http (rumored to 80/tcp), port 593 is what you should be aware of.
The DCOM vuln is indeed usable over port 593.
-Original Message-
From: Jasper Blackwell [mailt
Yes, I've signed on to this list only 2 days ago and have noticed the
very same cross-posting.
Case in point:
My group uses Update Expert - I noticed, determined and documented how &
why it fails to successfully roll up Win2K SP4 and MS03-026.
I sent this information to Russ (NTBugtraq's editor &