Re: DNS Records

2003-06-18 Thread Tim Greer
From: Fred Dirkse - OIC Group, Inc. [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, June 17, 2003 2:26 PM Subject: DNS Records Is it possible to point to a DNS server and somehow get ALL records from it (ie - return all the domain records that server is authoratative for)? If so, how?

RE: sshd for windows

2003-06-18 Thread Depp, Dennis M.
As is Windows Terminal Services and Remote Desktop. I would expect there are more installations of Window Terminal Services on Windows 2000 servers that there are installations of OpenSSH or WinSSH on Windows 2000. Greg, I really don't want to turn this into a religious war. Derek is looking

Re: scrambling perl source code

2003-06-18 Thread Dana Epp
Hey Charles, Although I do not know to what extent you need to obscure your code, I can say right off the top of my head that fretting about obscuring your project by scrambling it is not an effective way to increase the security of your code, or decrease the attack surface. Anything that you can

Re: password protection in office XP documents

2003-06-18 Thread Brian Eckman
I did copy the contents of a protected file (not the full password protection - the changes protection that Leif discussed) into a new doc and save it before I wrote the message. In fact, I just did it again before I sent this message. Then I modified the new doc and saved it again. Then I

Re: Apache: limiting the execution place

2003-06-18 Thread exon
No misunderstanding from you, but sort of one for me. Sorry about that. Still though, I can't quite see the reason for hindering other users to see the script code. Only local users can read them in 'raw' format. Unless ofcourse there are some copyright issues here, or there are 'hardcoded' (as

Re: sshd for windows

2003-06-18 Thread Markus Rath
hello, yes , there is one i know. have a look to: http://lexa.mckenna.edu/sshwindows/ http://www.openssh.com http://www.cygwin.com/ http://www.networksimplicity.com/ so long markus rath Am Dienstag, 17. Juni 2003 03:29 schrieb Derek Perry: Is there a sshd for Windows (W2K Server is

DMZ, Tape Backup and Security

2003-06-18 Thread Erik Vincent
Hello to all, I would like to have comment on how to setup a backup strategie regarding a DMZ. Scenario 1: Put a tape unit/software in the DMZ and another one on the LAN to have everything separate. Plus side: No hole in DMZ Firewall Down Side: Cost (2 unit/software), 2 sofware to manage

Re: DNS Records

2003-06-18 Thread Tim Greer
- Original Message - From: Fred Dirkse - OIC Group, Inc. [EMAIL PROTECTED] To: Tim Greer [EMAIL PROTECTED]; [EMAIL PROTECTED] Sent: Tuesday, June 17, 2003 8:27 PM Subject: RE: DNS Records For a server you have some type of access to, or just from any DNS server you want to choose?

network segment range which NIDS can detect?

2003-06-18 Thread SB CH
Hello, all. I installed snort NIDS at my linux which connected at switch and I confirmed that snort could detect some other servers were attacked. As I know, NIDS can detect some other attacks in the range of a network segment. Then what is a same network segment in the switch? I can detect

Re: scrambling perl source code

2003-06-18 Thread Tim Greer
From: Dana Epp [EMAIL PROTECTED] To: Tim Greer [EMAIL PROTECTED]; Charles Lacroix [EMAIL PROTECTED]; [EMAIL PROTECTED] Sent: Tuesday, June 17, 2003 6:09 PM Subject: Re: scrambling perl source code Hey Tim, Even compiling it isn't enough. Its just as easy to use a decompiler and then

RE: DNS Records

2003-06-18 Thread Brian Kirby
Yes it is possible if you allow any host(ip address) to do zone transfers. Most name server daemons allow you to specify what hosts you want to allow to request transfers, and block all others. You can also block TCP port 53, and only allowing UDP port 53 with an ACL or Firewall ruleset. I do

Re: sshd for windows

2003-06-18 Thread Adam Newhard
3DES is 168 bit or 112 bit. I don't know the implementation of 3des in sshd so you can yell at me if you'd like. now for my obvious statement (there's gotta be 1 person who doesn't know how 3DES works): 3des does encryption-decryption-encryption. when it's 168 bit, it's really 3 56 bit keys

RE: DNS Records

2003-06-18 Thread Fred Dirkse - OIC Group, Inc.
For a server you have some type of access to, or just from any DNS server you want to choose? Any DNS server I choose...(or if I get choosen) --- Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The

RE: Windows 2000 Registry

2003-06-18 Thread dave kleiman
http://www.s-doc.com/products/securitelok.asp Has profiles for all just about all Windows Server configurations, and takes about 20 minutes per server. _ Dave Kleiman [EMAIL PROTECTED] www.netmedic.net High achievement always takes place in the framework of high

RE: sshd for windows

2003-06-18 Thread Benjamin Meade
Try Zebedee. Very easy to setup, and secure. Can use it to wrap vnc/terminal services. www.winton.org.uk/zebedee/ Benjamin Meade System Administrator LanWest Pty Ltd -Original Message- From: Derek Perry [mailto:[EMAIL PROTECTED] Sent: Tuesday, 17 June 2003 9:30 AM To: [EMAIL

Home Directory Security

2003-06-18 Thread Mada Dulate
are there any security issues related to using a home directory in MS. i do not use them, but have been running into a lot of clients who do. _ Add photos to your messages with MSN 8. Get 2 months FREE*.

Re: scrambling perl source code

2003-06-18 Thread Dana Epp
Hey Tim, Even compiling it isn't enough. Its just as easy to use a decompiler and then process it through some of perl's own back end translator routines ( -M0=Deparse etc) which can even de-obfuscate the code to some degree. Although its better than doing nothing, its not a far leap to get to

Re: sshd for windows

2003-06-18 Thread Ronish Mehta
Try VShell from Van dyke Technologies Inc --- Malte von dem Hagen [EMAIL PROTECTED] wrote: Hallo Derek Perry, am Dienstag, 17. Juni 2003 um 03:29:36 schrieben Sie: Is there a sshd for Windows (W2K Server is the actual OS) that is freely available? I found this with google:

RE: sshd for windows

2003-06-18 Thread Depp, Dennis M.
I really like VNC, but it has little security and no encryption. Denny _ From: Shawn Knisely [mailto:[EMAIL PROTECTED] Sent: Tuesday, June 17, 2003 7:04 PM To: Depp, Dennis M.; Derek Perry; [EMAIL PROTECTED] Have you checked out VNC

Re: DNS Records

2003-06-18 Thread Alberto Cozer
If the DNS server is properly configured you wont'be able to gather much data. But there are some techniques: 1) ls -d. 2) Remote replication using a DNS server you own. 3) Using tools (e.g. DNSDigger). 4) Dictionary based DNS scan Whenever doing this it is strongly recommended to proxy or

More tools

2003-06-18 Thread Hanuska Ivo
Hi, I need to find internet links to folowing tools i saw here before: 1. Reverse shell - generaly speaking tool, which works as terminal emulation, but also can be configured to also listen on some TCP port. 2. IP paket creator - tool which can be used to assemble and send any configuration

RE: sshd for windows

2003-06-18 Thread DeGennaro, Gregory
I agree that this should not be a religious war. How about this Derek, look into Remote Desktop connection first and if that seems insecure for you, use OpenSSH for Windows from the URL given to you? OpenSSH supports Blowfish (stronger encryption and faster than 3DES) and 3DES (168 bit

MS Service Packs

2003-06-18 Thread Thad Horak
All, Has anyone had any luck decyphering what security fixes are include in what MS service packs. For example, if I apply SP3 to a W2K Server will this patch all security issues found for the base OS up until the release of SP3. What about IIS/SMTP/FTP, etc fixes. Do I need to install these

RE: Digital Evidence Question - What is an effective Windows hard -disk search tool?

2003-06-18 Thread Robinson, Sonja
I was a bit rushed yesterday, sorry, so here is a bit more detail but still in a general kind of knowledge base. I'm trying to keep it a simple explanation so that the general population can understand the basics. If people want to get really technical please feel free In Windows operating

Encryption Level of web site

2003-06-18 Thread Patrick Boucher
Greetings, I would like to know what are the permited (and deny) encryption Level on a Web Site. Nessus tell me that my target host accept 40 bit, 56 bits and 128 bits encryptions.. I would like to know how that information was obtained? How can i get that information?(Without using

erasing data from HP servers EMC disk arrays

2003-06-18 Thread Orlando J. Cano
I was wondering what some of you are using to erase data from old HP-9000 servers and new EMC disk arrays which hold up to 96 hard drives. The lease for these equipments are coming up and I need to come with a process to erase the data. Degaussing the drives is one option but I was wondering is

RE: password protection in office XP documents

2003-06-18 Thread security
No one is claiming that printing is compromising content integrity. People protect content in document to stop it from being alerted other wise why else would they go through the effort of protecting? A protected document should remain protected in its own framework. What I mean by this is that;

Re: DNS Records

2003-06-18 Thread Tim Greer
But only if you allow access. To find the zones on a DNS server without some means of allowed access on a decently configured DNS server, is not going to list zones you don't know the name of. -- Regards, Tim Greer [EMAIL PROTECTED] Server administration, security, programming, consulting. -

RE: DNS Records

2003-06-18 Thread Ben Collins
Assuming the DNS server will allow zone transfers. On a Linux box type host -l DOMAIN. On a Windows box type nslookup then ls DOMAIN. Ben. -Original Message- From: Fred Dirkse - OIC Group, Inc. [mailto:[EMAIL PROTECTED] Sent: 17 June 2003 22:26 To: [EMAIL PROTECTED] Subject: DNS Records

Re: Apache: limiting the execution place

2003-06-18 Thread Tim Greer
From: exon [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, June 18, 2003 6:57 AM Subject: Re: Apache: limiting the execution place No misunderstanding from you, but sort of one for me. Sorry about that. Still though, I can't quite see the reason for hindering other users to see

RE: Cisco Pix UDP Built

2003-06-18 Thread Naman Latif
Which Software version you are using ? I am not sure of the earlier versions but with 6.2(2), message 302015 is used to define the UDP connections with inbound\outbound keyword included. firewall %PIX-6-302015: Built outbound UDP connection 4024629 for outside:x.x.x.x/22368 (x.x.x.x/22368) to

Re: Php security on Windows

2003-06-18 Thread Kelly Martin
Fab, There will be an article called Securing PHP: Step-by-step appearing on the SF Online site next week. Although it will appear in the UNIX area, you will likely still find it somewhat applicable to PHP on a MS server, particularly if you compile PHP yourself to get exactly what you want.

RE: Encryption Level of web site

2003-06-18 Thread Michaels, Tod
I believe what you are looking for may be found in the Windows registry, as outlined in MS article Q241447, How to Restrict the Use of Certain Ciphers in Internet Information Services 5.0. These registry keys indicate which SSL and TSL encryption ciphers are enabled on your server. Per the

Hard Drive Encrypting

2003-06-18 Thread Martin Smith
Good Day, I have a need to encrypt the hard drive for our laptops running XP and 2000 pro. If it can, it needs to be as invisible to the users as possible. Plus, it has to be linked to the user’s login and password or the users’ cac. What tools are out there? Thanks for

ptrace24 - How It apeared in my box?

2003-06-18 Thread Jairo Tcatchenco
Hello all! Using chkrootkit tool, I found a root kit inside my box. A door was opened and I haven't found yet how they putted it there (there is a folder in tmp, called ..\ \ \ with a lot of malicious files). I left just the basic doors opened (ntp, domain, ssh, http, https). Could

Re: MS Service Packs

2003-06-18 Thread James Baumgardner
I would recommend doing some reading over here - http://www.securityfocus.com/infocus/microsoft Lots of good info about patching an IIS box from the start. Should cover all you're looking for. Also, on technet: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/secur

Re: MS Service Packs

2003-06-18 Thread frank
you can find info about fixes in the Service pack 3 here http://support.microsoft.com/default.aspx?scid=kb;en-us;q260910 list of fixes http://support.microsoft.com/default.aspx?scid=kb;EN-US;320853 also information about postSP3 fixes too

RE: sshd for windows

2003-06-18 Thread Depp, Dennis M.
Richard, The telnet built into Windows 2000 uses NTLMv2 authentication by defalt. While this is not 3DES or RC4, it is still not plain text. Dennis -Original Message- From: Richard Parry [mailto:[EMAIL PROTECTED] Sent: Wed 6/18/2003 12:19 PM To:

Re: sshd for windows

2003-06-18 Thread Pascal Junod
[snip] Of course, it supports DES (56 bit encryption) but can be easily broken in today's desktop enviroment, It is not _that_ easy (but still possible) to find enough desktop computers to mount an exhaustive search against a 56-bit key. while the first two needs a cluster or NSA computer

Re: More tools

2003-06-18 Thread Jasmine
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Not sure if these are the tools you saw here before but these are the two tools that you may find useful. 1. Netcat http://lists.insecure.org/lists/bugtraq/1995/Oct/0028.html 2. Fragroute http://www.monkey.org/~dugsong/fragroute/ On Wednesday

RE: Cisco Pix UDP Built

2003-06-18 Thread Mann, Bobby
Hi Verde, You know in my opinion Cisco has one of the best support sites in the world. I don't believe there is a single product that can't be deployed using only their website. Example of what you asked for: Log Message %PIX-6-302005: Built UDP connection for faddr IP_addr/port gaddr

RE: Digital Evidence Question - What is an effective Windows hard -disk search tool?

2003-06-18 Thread Wilcox, Stephen
Hello It funny that this discussion started in the last few days.. As Murphy would have it, last night while installing a new nic card. Something happened to the boot.ini file and corrupted it. I don't know how or why except the possibility of it writing to the boot.ini file the nic

Re: MS Service Packs

2003-06-18 Thread Marco Araujo
Hi Thad, The list of updates included and bugs fixed is on the Service Pack Release Notes. As a example, let's talk about Win2k SP3. The homepage for this SP is: http://www.microsoft.com/windows2000/downloads/servicepacks/sp3/default.asp The list of updates can be found at the 'List of

Re: ptrace24 - How It apeared in my box?

2003-06-18 Thread Jeremy Gaddis
Jairo Tcatchenco writes: Using chkrootkit tool, I found a root kit inside my box. A door was opened and I haven't found yet how they putted it there (there is a folder in tmp, called ..\ \ \ with a lot of malicious files). I left just the basic doors opened (ntp, domain, ssh, http, https).

Re: Hard Drive Encrypting

2003-06-18 Thread Birl
mart50: Date: Wed, 18 Jun 2003 19:00:54 + mart50: From: Martin Smith [EMAIL PROTECTED] mart50: To: [EMAIL PROTECTED] mart50: Subject: Hard Drive Encrypting mart50: mart50: mart50: mart50:Good Day, mart50: mart50: I have a need to encrypt the hard drive for our laptops

Re: Central Win2000 auditing logs

2003-06-18 Thread Birl
sgay: Date: Wed, 18 Jun 2003 13:32:18 -0400 sgay: From: Stephen Gay [EMAIL PROTECTED] sgay: To: [EMAIL PROTECTED] sgay: Subject: Central Win2000 auditing logs sgay: sgay: Hello, sgay: sgay: Does anyone have any experience with centrally locating Windows2000 log sgay: files, for disaster

Re: DNS Records

2003-06-18 Thread Marco Araujo
Hi Fred, Yes, it's possible. But depends on how the DNS server is configured. It's necessary that DNS server is allowing zone transfers. To get the records, install another DNS server and initiate a zone transfer to the other DNS server. It's a best pratice to allow zone transfers only to known

RE: Digital Evidence Question - What is an effective Windows hard -disk search tool?

2003-06-18 Thread Levasseur, Brian
Winhex is a great forensic/recovery tool that is very affordable. http://www.winhex.com/ -Original Message- From: Wilcox, Stephen [mailto:[EMAIL PROTECTED] Sent: Wednesday, June 18, 2003 1:54 PM To: [EMAIL PROTECTED] Subject: RE: Digital Evidence Question - What is an effective

RE: Digital Evidence Question - What is an effective Windows hard-disk search tool?

2003-06-18 Thread exon
Run linux from floppies. then you can mount the filesystem in question and (possibly) read from it. As a worst case scenario, you can get a binary image of the disk and use 'restore' software on it later (mount it as a loopback filesystem in linux and fiddle with partition table geometry and all

Re: Hard Drive Encrypting

2003-06-18 Thread Jason Stout
Check out http://www.drivecrypt.com. Specifically Drive Crypt Plus Pack. It won't do auth against the NT user/pass but I don't think you'll find a product that will. I've only heard of two products which can do full disk encryption. DriveCrypt is one of them, I can't remember the other.

RE: ptrace24 - How It apeared in my box?

2003-06-18 Thread Wiest, Damian
Jairo, Nearly all of the services you mentioned have had vulnerabilities published recently (depending on which implementations you're using). Without more information about your system I can only recommend that you reinstall, upgrade to the most recent releases of the services you mentioned and

RE: Digital Evidence Question - What is an effective Windows hard -disk search tool?

2003-06-18 Thread Gene LeDuc
If all you want to do is recover the info, you can attach the hard drive to a linux box and mount the NTFS partition. From that point you can browse the NTFS file system and copy any files you want. Depending on the flavor and version of linux, you may have to load an NTFS driver; I believe