I actually do this right now. I simply set my ssh daemon on port 80, and use
scp to covertly bypass most standard firewalls. Unless they do payload
inspection, you can normally pierce the firewall fine in this manner.
ie: scp -P 80 [EMAIL PROTECTED]:/get/some/file/ .
Short of that, you could prob
Because this is after the fact and you are tyring to do a forensic
investigation post mortum... its a little to late to turn on the proper
event logging to track user logins through EventLog (which you should have
on anyways. Never did understand why the default wasn't ON by default)
At this point
How about setting something up like a wiki and allowing for the public to
build the FAQ from that?
---
Regards,
Dana M. Epp
- Original Message -
From: "Kelly Martin" <[EMAIL PROTECTED]>
To: "Vachon, Scott" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Tuesday, July 22, 2003 10:46 AM
Have you considered using arp and simply checking your arp tables?
If you are on the same net, you can do a single ping to the broadcast to get
every card to respond, and then do something like:
arp -a | grep
Where is the MAC addr you are looking for. Note that on windows each
octet is separat
Have you checked out DansGuardian? It hooks in with Squid and works
extremely well.
http://dansguardian.org/
---
Regards,
Dana M. Epp
- Original Message -
From: "DeGennaro, Gregory" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, June 23, 2003 9:06 AM
Subject: RE: URL and Con
Hey Andrej,
I believe the problem you are having may be that when the tunnels are up the
traffic is getting routed through the tunnel rather than through the normal
outside paths.
One way that works extremely well for net to net IPSec VPN is to set up 4
tunnels.
1) Net A to Net B
2) Net A to Hos
Hey Patrick,
I don't have to much time right now to actually go and write something
clean, but here is a quick and dirty perl script to get you started that I
wrote during lunch. Basically it takes advantage of the OpenSSL libs through
Net:SSLeay to make the calls I recommended in my last email a
In a pinch you can use something like Knoppix, which will boot Linux from a
CD, assuming your bios is configured to allow for CD boot. This way you
don't have to strip the HD from the rest of the hardware and can still get
all the information from the machine and copy/clone it to a network disk,
ot
Firstly, being that nessus uses nasl scripts and plugins from source, you
SHOULD be able to find out exactly what they are doing from there. Check
something like /usr/src/nessus/nessus-plugins/ to get a better
understanding. I would guess from your email that you want to know how the
SSL cipher che
Hey Tim,
Even compiling it isn't enough. Its just as easy to use a decompiler and
then process it through some of perl's own back end translator routines
( -M0=Deparse etc) which can even de-obfuscate the code to some degree.
Although its better than doing "nothing", its not a far leap to get to t
Hey Charles,
Although I do not know to what extent you need to obscure your code, I can
say right off the top of my head that fretting about obscuring your project
by scrambling it is not an effective way to increase the security of your
code, or decrease the attack surface. Anything that you can
Here is a good start for you on some resources to assist you in hardening
your workstation(s).
The NSA released some unclassified documents on ways to reduce the attack
surface of you Microsoft based operating systems. I found the Windows XP and
2000 guides a good starting point if you are wanting
12 matches
Mail list logo