Re: file transfer over outbound port 80?

2003-08-14 Thread Dana Epp
I actually do this right now. I simply set my ssh daemon on port 80, and use scp to covertly bypass most standard firewalls. Unless they do payload inspection, you can normally pierce the firewall fine in this manner. ie: scp -P 80 [EMAIL PROTECTED]:/get/some/file/ . Short of that, you could prob

Re: finding who has logged in on Win2k Pro

2003-07-23 Thread Dana Epp
Because this is after the fact and you are tyring to do a forensic investigation post mortum... its a little to late to turn on the proper event logging to track user logins through EventLog (which you should have on anyways. Never did understand why the default wasn't ON by default) At this point

Re: building an FAQ for Security-Basics

2003-07-22 Thread Dana Epp
How about setting something up like a wiki and allowing for the public to build the FAQ from that? --- Regards, Dana M. Epp - Original Message - From: "Kelly Martin" <[EMAIL PROTECTED]> To: "Vachon, Scott" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Tuesday, July 22, 2003 10:46 AM

Re: Getting an IP address from a MAC address

2003-07-03 Thread Dana Epp
Have you considered using arp and simply checking your arp tables? If you are on the same net, you can do a single ping to the broadcast to get every card to respond, and then do something like: arp -a | grep Where is the MAC addr you are looking for. Note that on windows each octet is separat

Re: URL and Content Filtering Proxy

2003-06-24 Thread Dana Epp
Have you checked out DansGuardian? It hooks in with Squid and works extremely well. http://dansguardian.org/ --- Regards, Dana M. Epp - Original Message - From: "DeGennaro, Gregory" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Monday, June 23, 2003 9:06 AM Subject: RE: URL and Con

Re: Linux FreeS/WAN road warrior problem

2003-06-24 Thread Dana Epp
Hey Andrej, I believe the problem you are having may be that when the tunnels are up the traffic is getting routed through the tunnel rather than through the normal outside paths. One way that works extremely well for net to net IPSec VPN is to set up 4 tunnels. 1) Net A to Net B 2) Net A to Hos

Re: Encryption Level of web site

2003-06-21 Thread Dana Epp
Hey Patrick, I don't have to much time right now to actually go and write something clean, but here is a quick and dirty perl script to get you started that I wrote during lunch. Basically it takes advantage of the OpenSSL libs through Net:SSLeay to make the calls I recommended in my last email a

Re: Digital Evidence Question - What is an effective Windows hard -disk search tool?

2003-06-19 Thread Dana Epp
In a pinch you can use something like Knoppix, which will boot Linux from a CD, assuming your bios is configured to allow for CD boot. This way you don't have to strip the HD from the rest of the hardware and can still get all the information from the machine and copy/clone it to a network disk, ot

Re: Encryption Level of web site

2003-06-18 Thread Dana Epp
Firstly, being that nessus uses nasl scripts and plugins from source, you SHOULD be able to find out exactly what they are doing from there. Check something like /usr/src/nessus/nessus-plugins/ to get a better understanding. I would guess from your email that you want to know how the SSL cipher che

Re: scrambling perl source code

2003-06-18 Thread Dana Epp
Hey Tim, Even compiling it isn't enough. Its just as easy to use a decompiler and then process it through some of perl's own back end translator routines ( -M0=Deparse etc) which can even de-obfuscate the code to some degree. Although its better than doing "nothing", its not a far leap to get to t

Re: scrambling perl source code

2003-06-18 Thread Dana Epp
Hey Charles, Although I do not know to what extent you need to obscure your code, I can say right off the top of my head that fretting about obscuring your project by scrambling it is not an effective way to increase the security of your code, or decrease the attack surface. Anything that you can

Re: Locking down workstation

2003-06-11 Thread Dana Epp
Here is a good start for you on some resources to assist you in hardening your workstation(s). The NSA released some unclassified documents on ways to reduce the attack surface of you Microsoft based operating systems. I found the Windows XP and 2000 guides a good starting point if you are wanting