RE: Locking Cisco Router

2002-11-18 Thread Stephen Wilcox
Not that I know of but you would not want to even if the was. The only way to recover a router if the password has been forgotten is to console into it. That requires The engineer to be on site and to have access to the "secure" area where the equipment has be deployed. If you were/are able to "

RE: PIX Question

2002-11-18 Thread John Canty
Believe it or not, this does seem pretty rock solid advice. So the next question would be what steps would one take to protect the perimeter router??? Thanks, //John -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Thursday, November 14, 2002 8:24 AM To: [EMAIL

Re: Internet Explorer 6 'Autocomplete settings' and username/password retention

2002-11-18 Thread Donnie Tognazzini
As an aside: Does anyone know where the autocomplete data is stored? I've checked the registry and have scanned loads of binary files on my own Win98 machine with no luck. I used sysinterals.com regmon and filemon, but it didn't help. Thanks, Donnie --- Jim Markley <[EMAIL PROTECTED]> wrote: > S

Re: Company Firewall's IP Address

2002-11-18 Thread Meritt James
The packets do not have to go directly to the source IP. They have to get to something that can get them to something... that can get to the source IP. Extrapolate proxies. Jim Bill Hamel wrote: > > Then routing wise, how do the packets find their way back to the firewall > if they don't know

Re: TCP vs UDP II

2002-11-18 Thread Donnie Tognazzini
Please do a google on "TCP Hijacking".. very possible.. not very easy.. but applications like "hunt" ( for the script kiddies ) exist.. --- Pablo Gietz <[EMAIL PROTECTED]> wrote: > Dear list: > It's possible that a intruder could take active part > of a TCP connection > after this was establishe

RE: Locking Cisco Router

2002-11-18 Thread matt
Why would you want to do that? Is it company owned or privately owned? If company owned, then if you quit or get fired, only you know the password to the router itself else the next expert will have to reconfigure the router changing the bits so that the password no longer exists creating time...

query on firewall throughput.....

2002-11-18 Thread SaiKrishna
Hi all, I have seen and read some of the Firewall vendors say that their firewall throughput is put 380 mbps or 1Gbps with some 2,80,000 concurrent sessions. What does it mean ? Please clarify me. Thanks in advance.. Sai

RE: Wireless security and VPN

2002-11-18 Thread Chris Martin
The 802.11x (I think that's what it's called) system may be what you are looking for. This system utilises the client authenticating to a RADIUS server via EAP. Most Cisco wireless gear has this WEP type (called LEAP). It's quite strong and the keys change regularly at predetermined intervals. Eve

RE: Secure e-mail

2002-11-18 Thread Andreas Andreas
| -Original Message- | From: Ross Nelson [mailto:[EMAIL PROTECTED]] | Sent: 12. november 2002 23:03 | Subject: RE: Secure e-mail | | Yes, but GnuPG is licensed under the GPL, isn't it? You could use | that as an alternative. The downside to GnuPG, if it is an option, | is that it's done

Re: Webmin Security Questions

2002-11-18 Thread Meritt James
Only after flipping to the proper configuration: BRAIN on "Sergey B. Kamyanov" wrote: > > Best UNIX management tool is /dev/hands :) > > Regards, > > Sergey Kamyanov > > System Administrator > R.I.S.K. Co > http://www.risk.az > > > -Original Message- > > From: Chuck Spafford [mail

RE: PIX Question

2002-11-18 Thread Stephen Wilcox
James, I would still practice RFC1918 and RFC2827 at your edge router Stephen Wilcox R & D Specialists Universal Computer Systems Voice: (713) 718-1800 ext. 2172 Email: [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Thursday, November 14,

Re: Secure FTP Server Search

2002-11-18 Thread IDS Guy
You can have a look at CERT's site for information about these FTP commands. E.g.; for PORT command, please see the following links... http://www.cert.org/advisories/CA-1997-27.html http://www.cert.org/tech_tips/ftp_port_attacks.html --- Charley Hamilton <[EMAIL PROTECTED]> wrote: > I've used

Re: Company Firewall's IP Address

2002-11-18 Thread Frederick Garbrecht
The packets have the firewall's external interface ip as their destination ip field; the firewall handles the address translation back to the internal host. When you initiate an outbound connection from an internal host, the firewall substitutes the 'hide-NAT' address (the firewall's external inte

Re: Smurf ,land attacks

2002-11-18 Thread Donnie Tognazzini
If you want full control of network read/writes use libnet/libpcap.. have a look at tcpdump.org.. Using libnet/libpcap you can write directly to the wire. --- Paulo Abrantes <[EMAIL PROTECTED]> wrote: > Hello Vik, > > What the attacker does is not allowing the Kernel to > fill in the IP datagra

RE: Contractors on Company Networks - Network segregation

2002-11-18 Thread Bill Lavalette
Willie - We too were faced with this issue. Here are the things we did to somewhat lock them down.. first we determined what internal resources they needed I.E. printer access internet access etc etc.. using NT we brought them on the domain with timed access from x to y for instance if the contr

RE: Open All Outbound Ports?

2002-11-18 Thread Mark Merchant
At 11:44 PM 11/13/02 -0500, you wrote: I never agreed with it, but one of their reasons to open this was passive FTP. Their reason was a lot of the sites that were visited used Passive FTP, that randomly uses any port above port 1024. quick reply, hope this hasn't been covered ad naseum... a s

apache server plus ipfilter

2002-11-18 Thread Anant Tamgole
Dear all, We recently deployed a web server on Solaris 8(Intel), with apache 1.3.27 and ipfilter firewall. Is this a good combination or any issues, comments ? regards anant

Microsoft SMS SNMP functionality

2002-11-18 Thread Vachon, Scott
Our Network Operations group recently noted an increased failure on snmp queries against our internal routers and switches. After tracking down the offending IP address, we discovered that our Desktop group had deployed Microsoft SMS company- wide and it was attempting network discovery by sending

RE: PIX Question

2002-11-18 Thread jamesworld
Stephen, et al, I agree whole heartedly with 2827 filtering and the PIX can do that as well (router can too). I however, disagree with 1918 at the edge router. The ASA algorithm in the PIX makes it a better location to handle the NATing of public to 1918 addresses. Also, the edge router is n

RE: Yahoo Messenger Stale Sessions

2002-11-18 Thread Leonard.Ong
I haven't tried this on Linux. I guess nobody cares about having zombie sessions on their machine Have to come up with a proof of concept attacks. Regards, Leonard Ong Network Security Specialist, APAC NOKIA Email. [EMAIL PROTECTED] Mobile. +65 9431 6184 Phone. +65 6723 1724 Fax.+

How to reenable IE Setting privilages

2002-11-18 Thread Leonard.Ong
Hi, I have loaded a preset config for Internet Explorer 6. Now most of the settings e.g. proxy, dial-up, etc are greyed out. Anyone knows how to unload the config file and regain access to settings ? Thanks Regards, Leonard Ong Network Security Specialist, APAC NOKIA Email. [EMAIL PROTECT

Re: Risk of using SS#s (last 4 digits) for authentication

2002-11-18 Thread Donnie Tognazzini
For example: my bank uses the last digits of the SSN to login.. so all you need to compromise my account is my account number and the last four digits of my SSN. and how does one get my SSN or bank account number?? dumpster diving!!.. also: some websites use the SSN as the login.. and then so