Re: Wireless Networking

2003-07-09 Thread Raven Override
Hi volks, So which Access Point products do U say it is good @ security? Greetz Raven Override There are 10 different people on earth, those who understand binary and those who don't --- Evaluating SSL VPNs' Consider NEOT

Re: gotomypc exploit

2003-07-09 Thread Colin Rous
At 03:59 PM 08/07/2003, gerald wrote: >just got off the phone with "GoToMy PC" regarding this incident. Lady who >lead the investigation in conjunction with the Secret Service gave me a very >clear and concise explanation of the events which took place last Dec. Here's the account from the Depart

RE: Strange files found on Solaris8

2003-07-09 Thread Carpio, Brian
It's from Netbackup -Original Message- From: Birl [mailto:[EMAIL PROTECTED] Sent: Wednesday, July 09, 2003 2:43 PM To: [EMAIL PROTECTED] Subject: Re: Strange files found on Solaris8 Jiang: Date: Wed, 9 Jul 2003 15:27:11 +0800 Jiang: From: Jiang Peng <[EMAIL PROTECTED]> Jiang: To: [EMA

Re: HTTPS - How hard to decrypt?

2003-07-09 Thread Jon Baer
i would try downloading ettercap and seeing for yourself ... http://ettercap.sourceforge.net - jon pgp key: http://www.jonbaer.net/jonbaer.asc fingerprint: F438 A47E C45E 8B27 F68C 1F9B 41DB DB8B 9A0C AF47 - Original Message - From: "Craig Brauckmiller" <[EMAIL PROTECTED]> To: <[EMAIL

RE: HTTPS - How hard to decrypt?

2003-07-09 Thread Richard Parry
Depending on the SSL encryption used (high chance its 128bit encryption) then breaking SSL certificates is extremely difficult, if you remember about 6 months ago a university did manage to extract a small number of characters from an SSL transaction, but this was using a large cluster of number-cr

Re: HTTPS - How hard to decrypt?

2003-07-09 Thread Birl
Craig: Date: 8 Jul 2003 17:33:02 - Craig: From: Craig Brauckmiller <[EMAIL PROTECTED]> Craig: To: [EMAIL PROTECTED] Craig: Subject: HTTPS - How hard to decrypt? Craig: Craig: Craig: Craig: We have begun rolling out wireless cards to our VP laptops. We have also Craig: purchased T-Mobile

Re: Strange files found on Solaris8

2003-07-09 Thread Birl
Jiang: Date: Wed, 9 Jul 2003 15:27:11 +0800 Jiang: From: Jiang Peng <[EMAIL PROTECTED]> Jiang: To: [EMAIL PROTECTED] Jiang: Subject: Strange files found on Solaris8 Jiang: Jiang: Hi All, Jiang: Jiang: I just found some strange files under Root directory of my Solaris 8. Jiang: Jiang: the fil

RE: Strange files found on Solaris8

2003-07-09 Thread Carpio, Brian
They are from NetBackup I think just the master server E-Mail veritas for more info. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Wednesday, July 09, 2003 12:22 PM To: Jiang Peng; [EMAIL PROTECTED] Subject: Re: Strange files found on Solaris8 > -Origina

RE: Strange files found on Solaris8

2003-07-09 Thread Carpio, Brian
>From Google!! This probably will set the record for the longest delay in posting a summary. Original Question, posted on 2/8/2000: Just noticed that we have about a gazillion files in / called: .SeCuRiTy.## (where ## is a number) Anyone have any idea what th

Re: gotomypc exploit

2003-07-09 Thread gerald
Hi, just got off the phone with "GoToMy PC" regarding this incident. Lady who lead the investigation in conjunction with the Secret Service gave me a very clear and concise explanation of the events which took place last Dec. It related to a gang of people who were putting keystroke loggers

Re: Top 10 (secure) programs

2003-07-09 Thread Brad Mills
Shane, > How about people posting their favorite ‘’secure’’ programs for email, > etc... :-) Windows: Virtual Access. Plain text, you can select not to view html, and *anything* not in plain ol' text comes as an attachment. Further, you can set it to require a double-click to open said attch'd

RE: Ten least secure programs

2003-07-09 Thread Yoo, Gene
All this is completely irrevelant to the actual post as well as the post itself. There were too many ifs and other subjective matter. There are many of us subscribe to this post, be little bit courteous and send "electronics" email barrage to each other and stop wasting everyone's time. Learn ho

SecurityFocus new article announcement

2003-07-09 Thread Kelly Martin
The following three articles were added to SecurityFocus this week: U.S. Information Security Law, Part 4 By Steven Robinson (July 09, 2003) This is the last article in a four-part series looking at U.S. information security laws and the way those laws affect the work of security professionals.

Re: Mail relay

2003-07-09 Thread Tim Greer
What platform and mail service are you running? Have you considered on hiring a qualified admin to secure your server and ensure you aren't running an open relay? What tool was used to test this that claims you are running an open relay? -- Regards, Tim Greer [EMAIL PROTECTED] Server administrat

HTTPS - How hard to decrypt?

2003-07-09 Thread Craig Brauckmiller
We have begun rolling out wireless cards to our VP laptops. We have also purchased T-Mobile Hotspot accounts for them to use in such places as Starbucks, American Admiral's Clubs, etc. >From my testing, the user name and password entry screen that TMobile requires you to fill in before they

Re: Strange files found on Solaris8

2003-07-09 Thread salgak
> -Original Message- > From: Jiang Peng [mailto:[EMAIL PROTECTED] > Sent: Wednesday, July 9, 2003 07:27 AM > To: [EMAIL PROTECTED] > Subject: Strange files found on Solaris8 > > Hi All, > > I just found some strange files under Root directory of my Solaris 8. > > the files are named as: .Se

RE: Wireless Security Notes and Findings (from this list and other places)

2003-07-09 Thread Potter, Tim
Trying again. Didn't seem to go through the first time... Here is some info I've gleamed off this list. I can't credit all the authors as this info is from about 10 different people. I've also included the solution we are going to implement. There are two general areas of wireless security:

RE: Best Linux Distribution for laptop - Debian is not proper for laptop?

2003-07-09 Thread DeGennaro, Gregory
Good distro since it uses a BSD-like package manager. However, you need to be quite the expert to use this since it does not come with a pretty GUI. Installation documentation is available on the website. --Greg -Original Message- From: Meidinger Chris [mailto:[EMAIL PROTECTED] Sent: T

Re: Mail relay

2003-07-09 Thread Terry Soucy
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Heya, First line of attack is to disable the smtp daemon until this is concluded (that is, if you haven't already). I am a big fan of qmail / ucspi-tcp solution. qmail is one of the most secure and stable MTAs available, and with ucspi-tcp, you hav

Re: Mail relay

2003-07-09 Thread Peter Van Eeckhoutte
in theory : make sure an external IP is not allow to send emails from a third party domain to another third party domain using your mailserver practically : this depends on the type of mailserver you are using... - Original Message - From: "JasonTay" <[EMAIL PROTECTED]> To: <[EMAIL PRO

Re: Mail relay

2003-07-09 Thread salgak
> -Original Message- > From: JasonTay [mailto:[EMAIL PROTECTED] > Sent: Wednesday, July 9, 2003 02:20 AM > To: [EMAIL PROTECTED] > Subject: Mail relay > > hi, > > i had experience the following:the following is some feedback from our vendor: > > We had try the following:on using a relay/spa

RE: Windows 2000 VPN Set-Up

2003-07-09 Thread news
Jei, http://support.microsoft.com/default.aspx?scid=kb;en-us;810761 Here's a great link with all the white papers you can handle. Good luck!! Paul D -Original Message- From: Julias P [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 5:29 AM To: [EMAIL PROTECTED]; [EMAIL PROTECTED

RE: Mail relay

2003-07-09 Thread David Gillett
When an SMTP server receives an email message that is not for one of its local domains, the default behaviour is to look up the "mail exchanger" address for the destination domain and forward the message there. Most SMTP servers belong to some organization, and use this function to handle outbou

RE: Ten least secure programs

2003-07-09 Thread Brad Bemis
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I will refer back to a previous statement made along these same lines. Note however that I am not interested in any kind of religious debate over who's systems are better or more secure. I maintain a firm belief in "the right tool for the right job".

Re: Firewall Comparisons

2003-07-09 Thread chort
On Mon, 2003-07-07 at 09:30, Bryan S. Sampsel wrote: > (snipped for brevity) > > Keith A. Glass wrote: > > -Original Message- > > > > > > > I admit to a predjudice towards firmware-based firewalls, only because the > > underlying OS's of an OS-based firewall may or may not be properly h

RE: where should I start? help!

2003-07-09 Thread DeGennaro, Gregory
Yes, this is good too. I do not believe it is the PIX, however still worth an investigation. I would start with the 2600 first. I am basing this off the information you gave us from the router. Regards, Greg DeGennaro Jr., CCNP Security Analyst -Original Message- From: Paul Benedek [

RE: Wireless Networking

2003-07-09 Thread Kevin Ashurst
With a sniffer like airsnort, you can pick a MAC address out of the header, which is NOT encrypted by WEP, and then spoof your MAC (most cards, including Orinoco support this.) Kevin -Original Message- From: Jeff D [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 4:40 PM To: J. Bild

Mail relay

2003-07-09 Thread JasonTay
hi, i had experience the following:the following is some feedback from our vendor: We had try the following:on using a relay/spam tool from some website, we verified that we are able to relay through your mail server. As such, we can safely conclude that the cause of the problem is linked to "ot

Re: Windows 2000 port 10000

2003-07-09 Thread Jamie Pratt
Very much true - Personally, I just use fyodor's services file from his nmap distribution instead of the default systems' - I figure if anyone knows ports, its fyodor! ;-) (Plus, it has many more ports listed than the standard services file, including possible trojans/backdoors etc) regards, ja

RE: Wireless Networking

2003-07-09 Thread Mark McConnell
Wrong, besides MACs are so easily spoofed. -Original Message- From: J. Bilder [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 3:24 PM To: [EMAIL PROTECTED] Subject: Re: Wireless Networking What if you're running 128 Bit WEP and filter on MAC address? You can't even get a signal u

RE: Questions about 192.168

2003-07-09 Thread Jim
Brad wrote: < > 192.168.1.255 are both ping-able). When doing nmap, it shows > 192.168.1.255 as remote, the others as local. However, when I do a > traceroute on these supposedly local ones, it shows a number of hops out > over the Internet, implying that they are not connected locally. Do

RE: Wireless Networking

2003-07-09 Thread David J. Jackson
Ahno sorry. If I can figure out your MAC address on the network which takes about 3 minutes, I can spoof your MAC and I'm now allowed on your AP. Keep in mind like everyone else saidWEP can easily be cracked...and MAC filtering is even easier to blow by. -Original Message- Fro

RE: where should I start? help!

2003-07-09 Thread Paul Benedek
Hi, Once you have identified the traffic type i.e. web traffic port 80, you may wish to consider turning on some of the traffic management features within the Cisco router. This could be a change in queuing strategy and the use of Cisco's committed access rate feature. By using CAR, you can prio

Re: Firewall Comparisons

2003-07-09 Thread Tomas Wolf
I wouldn't forget NetScreen appliances. T. DeGennaro, Gregory wrote: My top three dedicated firewall devices; 1) Sidewinder - not officially or publicly cracked. 2) Nokia Checkpoint FW-1 Firewall - Rock on active/active (ip clustering) state and fail over. 3) Cisco PIX - cost of ownership an

RE: Windows 2000 port 10000

2003-07-09 Thread Jaymz Ringler
As a system administrator, I would freak if I was in this situation. I know what software is installed on all of my servers and know exactly what it's for and what ports it uses for communications. I think this is a good point to make. As a 3rd party security consultant, when we sell a secur

Re: Wireless Networking

2003-07-09 Thread Terry Soucy
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I'm not sure exactly how much information is required before the encryption can be successfully cracked. I let kisMAC run for about 5 or 6 minutes collecting packets (while I got my popcorn), but to answer your question, the iBook cracked the 128 bi

Strange files found on Solaris8

2003-07-09 Thread Jiang Peng
Hi All, I just found some strange files under Root directory of my Solaris 8. the files are named as: .SeCuRiTy.0, .SeCuRiTy.1, . until .SeCuRiTy.68. Following are part of the output of command: ls -al -rwx-- 1 daemon other128 Aug 20 2002 .SeCuRiTy.0 -rwx-- 1 daemon

AW: What runs on TCP 55317?

2003-07-09 Thread Meidinger Chris
If they are internal addresses, have you: 1. checked to see if the machine is alive (ping or a 'polite' port scan) - if it is, ask the operator if he knows anything, or ask to be allowed to check yourself what is running on it. It's possible that it is not a spoofed address but rather an infected

RE: Wireless Networking

2003-07-09 Thread Myers, Marvin
Sorry, but that is way off base. You can filter by anything that you want and it will not affect your ability to "get" a signal. You will still be able to receive packets, crack the WEP keys, and then enumerate the network. Ever heard of MAC spoofing? Nice try, but wrong info. Wireless is inherentl

FW: Questions about 192.168

2003-07-09 Thread check
-Original Message- From: David Gillett [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 12:59 PM To: [EMAIL PROTECTED] Subject: RE: Questions about 192.168 > Since 192.168 is a non-routeable IP (ie: wont reach the > Internet), it's > no real surprise that nothing answered you fr

AW: Getting an IP address from a MAC address

2003-07-09 Thread Meidinger Chris
if you are in a windows environment, nbtstat -c -a NetBIOS_Name will provide you with the remote NetBIOS table and MAC Address. Not sure if someone mentioned this before, i was only skimming the thread. I just ran across this doing an nbtstat and remembered that people had been talking about mac a

Re: Wireless Networking

2003-07-09 Thread ~Kevin Davis³
MAC addresses can easily be spoofed. ~Kevin Davis³ What possibly could go wrong? - Original Message - From: "J. Bilder" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Tuesday, July 08, 2003 3:24 PM Subject: Re: Wireless Networking > What if you're running 128 Bit WEP and filter on

Re: Wireless Networking

2003-07-09 Thread Jeff D
J. Bilder wrote: What if you're running 128 Bit WEP and filter on MAC address? You can't even get a signal unless you're MAC address is allowed.. Thanks! - Jeff IIRC, you can still intercept the transmissions but not be able to join the network.. JeffD -

Re: Tweaking /proc to avoid fingerprinting

2003-07-09 Thread Eagel
Hi Nawapong Nakjang, Thx for the info... Was looking for such a tool.. Got a better insight on the traffic that my proxyserver is handling. It is amazing how many portscans you see... John On 7/8/03 4:40 AM, "Nawapong Nakjang`" <[EMAIL PROTECTED]> wrote: > Yes it is possible, you can use a tool

let save logs program?

2003-07-09 Thread SB CH
Hello, all. Some application programs which allow remote connect, doesn't remain logs in the file like /var/log/secure or /var/log/messages. So is there any program or method(unix or linux based preferred) to let save or remain logs? Thanks in advance.