t; /instmsg/aliases/ - 404 -
>
>
> mike heitz ** sr it manager ** UPSHOT
> 312-943-0900 x5190
--
Jason Kohles [EMAIL PROTECTED]
Senior Engineer Red Hat Professional Consulting
EMAIL PROTECTED]]
> > Sent: Tuesday, December 17, 2002 5:41 AM
> > To: [EMAIL PROTECTED]
> > Subject: A Solution for sniffing
> >
> >
> >
> > Hello Folks,
> > I think i am being sniffed by somone on my
> > network, and
is in that mode.
>
The problem here is that tools that claim to detect cards in promiscuous
mode have a fairly low success rate, just because they don't find any
doesn't mean there aren't some out there.
--
Jason Kohles [EMAIL PROTECTED]
Senior Engineer Red Hat Professional Consulting
bypass NAT is for the attacker to add a static route for your internal
netblock that points at your router as a gateway. It is the
responsibility of this router (which should include a firewall) to
protect the internal network from attack, NAT alone won't do it.
--
Jason Kohles [EMAIL PROTECTED]
Senior Engineer Red Hat Professional Consulting
impersonation. They throw the book
> at you.
>
This is true, but not related to your analogy.
--
Jason Kohles [EMAIL PROTECTED]
Senior Engineer Red Hat Professional Consulting
e zone transfers are larger than queries, it isn't designed to
happen that way.
--
Jason Kohles [EMAIL PROTECTED]
Senior Engineer Red Hat Professional Consulting
her login
> restriction. Its kind of like CB radio. Everyone can legally listening
> to you chatting on CB radio.
>
>
> --
>
> [EMAIL PROTECTED] Collaborative Intrusion Detection
>
f it is web related this could help you (similar things
could be done with a router, but I only have sample configurations for
squid...
http://www.jasonkohles.com/notes/modem-simulator.html
--
Jason Kohles [EMAIL PROTECTED]
Senior Engineer Red Hat Professional Consulting
e the inherent wisdom of this tool. =)
--
Jason Kohles [EMAIL PROTECTED]
Senior Engineer Red Hat Professional Consulting
gt; Hi!
>
> Say an intruder connect himself to my wireless LAN, is there a way with a
> GPS and it's signal to know where he is physically? Where can I get more
> documentation on that?
>
> Thanks.
>
> --
> David Laganière
> Network/System Adminis
be
somewhere in the middle (and the timestamps may give it away).
--
Jason Kohles [EMAIL PROTECTED]
Senior Engineer Red Hat Professional Consulting
7;t block anything, whatever was causing your other tcp
applications not to work is almost certainly unrelated to this option.
--
Jason Kohles [EMAIL PROTECTED]
Senior System Architect
Red Hat Professional Consulting http://www.redhat.com/
und
a squid proxy that had been installed, but never used, was suddenly seeing
a lot of traffic loading only banner ads, but without loading the pages the
ads were contained in.
--
Jason Kohles [EMAIL PROTECTED]
Senior System Architect (
Comment: See http://www.treachery.net/~jdyson/ for current keys.
>
> iQCVAwUBPAuqVrlDRyqRQ2a9AQFUVQQAh4G/SLsltmzJYr2MP6YWxQC0t9luPMTO
> cWTO1ZMPOHePscqy7nSTmnVp4VsM+Um/tCtT7b+1Dbb8fg/l/++V8SCIg9GgnmXK
> dniDeclCHywNMPJOFhHofkuS2Ct6pAd5OWEdFhGZJlQt3MeWClUAhoNpkWEmWJdc
> G4R4+tliElc=
> =7g7l
> -END PGP SIGNATURE-
--
Jason Kohles [EMAIL PROTECTED]
Senior System Architect (703)786-8036 (cellular)
Red Hat Professional Consulting (703)456-2940 (office)
and i only want the out side traffic came to mail ports only
> > > so i opened the 25 tcp port and close any comming other ports
> > > but the servr stop to recieve mails
> > > wahen i allow all traffic on except icmp it works
> > > is there any other ports should be open to allow the mail server to =
> > > recieve mails
> > >
> > >
> >
> >
> >
--
Jason Kohles [EMAIL PROTECTED]
Senior System Architect (703)786-8036 (cellular)
Red Hat Professional Consulting (703)456-2940 (office)
it
is reporting on, while at the same time reporting referrers...
--
Jason Kohles [EMAIL PROTECTED]
Senior System Architect (703)786-8036 (cellular)
Red Hat Professional Consulting (703)456-2940 (office)
an
it several times, with mostly spoofed addresses, to hide your own address
which scanned it somewhere in the middle of that flood...
--
Jason Kohles [EMAIL PROTECTED]
Senior System Architect (703)786-8036 (cellular)
Red Hat Professional Consult
op3 over ssl...
--
Jason Kohles [EMAIL PROTECTED]
Senior System Architect (703)786-8036 (cellular)
Red Hat Professional Consulting (703)456-2940 (office)
-D Run Snort in background (daemon) mode
--
Jason Kohles [EMAIL PROTECTED]
Senior System Architect (703)786-8036 (cellular)
Red Hat Professional Consulting (703)456-2940 (office)
?
>
The date header is provided by the client, you can make it say whatever you
want.
--
Red Hat Professional Consulting Jason Kohles
(703)786-8036 (cellular)[EMAIL PROTECTED]
gt; >
> >Alan
> >
> >
> >
> >Alan J Wright B.Sc(Hons)(Open)
> >SMS +47624462772.
> >Email [EMAIL PROTECTED]
> > [EMAIL PROTECTED]
> >
> >
> >'You're a feisty little one but you'll soon learn respect'
> >
> >Return of the Jedi
>
> All the best
>
> Alan
>
>
>
> Alan J Wright B.Sc(Hons)(Open)
> SMS +47624462772.
> Email [EMAIL PROTECTED]
> [EMAIL PROTECTED]
>
>
> 'You're a feisty little one but you'll soon learn respect'
>
> Return of the Jedi
--
Red Hat Professional Consulting Jason Kohles
(703)786-8036 (cellular)[EMAIL PROTECTED]
21 matches
Mail list logo