Re: Massive port probs on 3123

2003-06-13 Thread Johannes Ullrich
So I pick out one of the IP's and email the hostmaster about the attack, = and this is his reply below. .. .. Hello, These 'attacks' are you running KaZaA. This IP is your KaZaA = supernode. Please learn how to use and understand your firewall. Do you have a dynamic IP address? If so,

Re: CIS server configuration audit tools.

2003-02-04 Thread Johannes Ullrich
I used the Linux version. The CIS audit tools will just report and not make any changes. In so far, I don't think that they will crash your server. Like all similar tools I have used so far, the CIS tools have to be adapted to your own organization. Don't just apply them blindly. The tool will

Re: Security Lab/Network

2003-01-25 Thread Johannes Ullrich
Just wondering what others are doing to expand their security knowledge? I'm interested to hear what others are doing with some sort of test network or lab. For a test 'lab/network', I like vmware. Not only does it safe on hardware, but it does make cleanup so much easier. --

Re: copying a disk image to restore on linux

2002-12-30 Thread Johannes Ullrich
# df -h == used MB or GB then: # dd if=/dev/hda1 bs=1M count=used MB or GB | gzip hda1-image.gz Will this work if the disk space is used non-continuous? -- [EMAIL PROTECTED] Collaborative Intrusion

Re: Login Banner

2002-12-23 Thread Johannes Ullrich
Here is a sample message: Authorized Use Only! You may also add a 'surrender your privacy' message: Authorized use only. By accessing this system, you agree to having all your actions logged. The logs may be shared with others. (the second half about sharing is important so you can for

Re: broadband connections in hotels

2002-12-09 Thread Johannes Ullrich
When the users wants to access the internet, he has to establish the VPN and use the corporate proxy server... better safe than sorry good policy This is bothering me... how can we set things up so the user can use the local broadband connection, without dynamically changing the policy,

Re: unexpected log entries

2002-12-09 Thread Johannes Ullrich
looks too me like good old Code Red Version 1. On Sat, 7 Dec 2002 16:13:11 +0100 Paolo Mattiangeli [EMAIL PROTECTED] wrote: Hi everybody, I guess maybe someone out there can help me with this. I have a w2k server running IIS 5 and keep receiving what I think to be probes on my web server.

Re: Question on Blocking an ISP.

2002-12-03 Thread Johannes Ullrich
Is there some way to whois arin on a nic handle to get all the classes? also depends on what you call 'AOL'. Here are the records for 'AOL-NOC-ARIN'. But should the Netscape division be considered part of AOL as an ISP? 152.163.0.0-152.163.255.255 America Online

Re: Need Help Building Linux Based Firewall

2002-11-28 Thread Johannes Ullrich
1. Which OS is considered the best suited for a firewall? hehe... flamewar time. many people say 'openbsd' here. but linux is probably better supported and pretty good as well. 2. What are the application/software required to be installed? openbsd and linux come with their own

Re: Red Hat Linux: passwd

2002-11-27 Thread Johannes Ullrich
The password check uses pam's 'cracklib' interface. For some details on this features see /usr/share/doc/pam-0.75/txts/README.pam_cracklib 'cracklib' uses a wordlist from /usr/share/dict/words . some details about cracklib: http://www.users.dircon.co.uk/~crypto/download/cracklib,2.7.txt On

Re: Part of the web page being MODIFIED !

2002-11-27 Thread Johannes Ullrich
I got one serious question that is I received complains regarding one of the image on my web site has been modified by a PORN picture ! While the image have resumed normal during the second visit. Well, one thing I haven't seen mentioned/asked: is this image hosted locally or included by

Re: Frequent offenders list

2002-11-26 Thread Johannes Ullrich
Thanks to everyone who responded... the verdict is definitely dshield. I was considering making it standard practice to block these addresses at my firewall and update on a weekly basis. I'm interested in what others think about this - recommended/valuable or not? So far I haven't seen that

Re: Survey: Chat and IM

2002-11-26 Thread Johannes Ullrich
We currently are allowing web based chat and instant messaging. I know that there are lots of security issues involved with its usage. The IT folks are telling me that it is a common practice in the industry. I have a hard time believing this and this is one battle I would like to take

Re: Frequent offenders list

2002-11-25 Thread Johannes Ullrich
see http://www.dshield.org or http://isc.incidents.org some of the more detailed reports you may want to check: http://isc.incidents.org/top10.html http://isc.incidents.org/source_report.html http://feeds.dshield.org/source_summary100.txt (list of sources that scanned 100 or more targets) On

Re: any VPN program at linux?

2002-11-22 Thread Johannes Ullrich
I would like to use VPN at linux? Do you know any recommendable program? short answer: plenty... (1) ssh tunnels, in particular tunneling PPP over ssh (+) easy to setup (-) only works linux-linux (-) tunnels everything over tcp. (2) CIPE (+) comes with redhat. (+) a bit better

Re: WIRELESS THEFT

2002-10-17 Thread Johannes Ullrich
Hi Can someone tell me if there are any laws regarding wireless theft? I don't think Congress has caught up with this yet. But from what I hear (usual disclaimer: INAL), you are free to pick up the signal as long as you are not breaking any WEP or other login restriction. Its kind of

Re: Cracking a server without services

2002-07-11 Thread Johannes Ullrich
I was just wondering. I know the rule is everything can be cracked. But can anyone point me to info on how to crack something with no ports open or/and perhaps tell me how that's called (so I can search...). A networked workstation without services is certainly harder to crack than a

Re: Centralized Database of MD5Signatures

2002-06-12 Thread Johannes Ullrich
That's really a nice idea by uid0, to have something like www.md5signatures.com/sigs.php?soft=fragroute or something like that, Like a large database of valid MD5 signatures for those opensource authors who want to take part in it. They can just add a link instead of the whole md5sum,