RE: [Full-Disclosure] CounterAttack

2003-08-01 Thread Schmehl, Paul L
> -Original Message- > From: Jeff Bankston [mailto:[EMAIL PROTECTED] > Sent: Friday, August 01, 2003 8:04 AM > To: [EMAIL PROTECTED] > Subject: Re: [Full-Disclosure] CounterAttack > > Phil, I have to echo the other comments, because sometimes > your return fi

Re: [Full-Disclosure] CounterAttack

2003-08-01 Thread Jeff Bankston
bout it. -Jeff - Original Message - From: "Dolbow, Phil" <[EMAIL PROTECTED]> Newsgroups: Security.Full-Disclosure To: "'Andy Wood'" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Thursday, July 31, 2003 8:52 PM Subject: RE: [Full-Disclosure] CounterAttack

Re: [Full-Disclosure] CounterAttack

2003-08-01 Thread Martin Peikert
Hello, Dolbow, Phil wrote: > If your network is PROBED by another system, where do you draw your > line? the same where s/PROBED/ATTACKED - in my opinion a probe is a prelude to further attacks and therefore I can see no difference. (Sometimes the difficulty is to decide: Is this a probe or not?

RE: [Full-Disclosure] CounterAttack

2003-07-31 Thread Dolbow, Phil
Andy et al.. Being of military (Infantry) origin I am quite prone to want to take the offensive and fire back at a high rate of fire on a system that is assaulting mine. I don't however do so as then I become one of the bad guys, and in my opinion, step over the line. I am interested though what