RE: Network scanning

2003-08-14 Thread Meidinger Chris
> It would be sort of odd for someone to go in a back room and pull out a computer, whip it up on the switch and proceed to fire up ethereal. Actually it's much more common than you think. I have known people that found old laptops laying on top of their switch racks that had been dsniffing traffi

RE: Transparent Screen Lock for Win NT/2000/XP

2003-08-14 Thread Meidinger Chris
Just out of curiousity, what makes this software particularly interesting for you? Do you want to lock the servers with the event log or task manager showing, and let people who are not allowed to 'touch' the servers monitor the logs and load, or what? badenIT GmbH System Support Chris Meiding

WG: Anit-Virus Software

2003-08-14 Thread Meidinger Chris
Sophos has complete remote management from an admin console. We even set up sophos to scan logins and auto install itself on domain members. badenIT GmbH System Support Chris Meidinger Tullastrasse 70 79108 Freiburg __ Es gibt 10 arten von Menschen auf dem Planeten, welche die Bin

Port 5000 and Windows XP

2003-08-14 Thread Meidinger Chris
service advertisments are normally IPX, which can be used anywhere that it is implemented ... primarily novell badenIT GmbH System Support Chris Meidinger Tullastrasse 70 79108 Freiburg -Original Message- From: dos cerveza [mailto:[EMAIL PROTECTED] Sent: Tuesday, August 12, 2003 10:38

RE: Event Viewer Monitoring Tool

2003-08-14 Thread Meidinger Chris
Hi Alastair, there are different methodologies to do this, but the basic one would be to concentrate all of your logs (for example on a log server with ntsyslogd) and then configure your syslog server to alert on specific events. At work what we did is wrote an application that dumps the event l

RE: Some 'new guy' questions

2003-08-14 Thread Meidinger Chris
Hi Sayo, if people flame you for asking newbie questions, it's usually because they have no idea themselves what they are talking about, just ignore them. Anyway, you can use fport from foundstone.com to see which application is bound to which port. Then you just use google to research the applic

RE: UNIX password auditing tool and the search for dictionaries too

2003-08-14 Thread Meidinger Chris
He means DoS in the sense that the person doesn't know their password, and can't access the passworded resource, silly. Thus, an allowed person is Denied the Service of a resource. Nobody (ok, almost nobody) is actually worried about an overloaded Password Machine. As far as standing behind people

AW: Anit-Virus Software

2003-08-14 Thread Meidinger Chris
It's a good idea to use one product on clients and another on the gateways so that you benefit from two signature bases / two heuristic approaches from two different companies. just a thought, not criticism. badenIT GmbH System Support Chris Meidinger Tullastrasse 70 79108 Freiburg __

RE: file transfer over outbound port 80?

2003-08-14 Thread Meidinger Chris
If port 80 is open, but does not go over a proxy, just have your FTP Server listen there and set it for passive mode. If port 80 does use a proxy, check to see if you can proxy your FTP over that too. Most organizations allow proxied FTP, just not direct. badenIT GmbH System Support Chris Meidin

AW: source LAN port 137 dest 169.x

2003-08-14 Thread Meidinger Chris
The vetrinarian's mouth: cat /usr/share/nmap/nmap-services | grep I do not mean this facetiously. Unfortunately IANA doesn't assign official ports to backdoors. -chris -Ursprüngliche Nachricht- Von: David Gillett [mailto:[EMAIL PROTECTED] Gesendet: Thursday, July 31, 2003 6:17 PM An:

RE: Using non-printable characters in passwords

2003-08-14 Thread Meidinger Chris
I know you don't want to hear this, but remember that MS Windows NT or 2000 running in hybrid mode uses an NTLM hash to represent the password. This hash represents only 7 characters, meaning that if you have a 21 character password, it is really 3 consecutive 7 character passwords. Thus your 21 ch

AW: Securing Web access from internet

2003-08-09 Thread Meidinger Chris
I agree, authenticating on the firewall is the best way to go. checkpoint fw-1 and rsa secureid work great together too for this. badenIT GmbH System Support Chris Meidinger Tullastrasse 70 79108 Freiburg __ Es gibt 10 arten von Menschen auf dem Planeten, welche die Binär verstehe

AW: XP Box appears to be compromised

2003-08-09 Thread Meidinger Chris
If that doesn't work, then download winlibpcap and ethereal, install, but on hub with computer or switch span port start ethereal say 'start filtering' and use the filter string 'src host MY_IP or dst host MY_IP' without apostrophe and replacing MY_IP with the IP address of the machine should have

AW: Anit-Virus Software

2003-08-09 Thread Meidinger Chris
I am very fond of Sophos AV from www.sophos.com. I have had it in production with signiture replication over 6 sites with about 3000 users and it worked like a charm. Licensing should also be fitting, they are pretty flexible. badenIT GmbH System Support Chris Meidinger Tullastrasse 70 79108 Fre

AW: User Tracking & Audit on Unix Systems

2003-08-07 Thread Meidinger Chris
try the acct (sometimes called pacct) software set badenIT GmbH System Support Chris Meidinger Tullastrasse 70 79108 Freiburg __ Es gibt 10 arten von Menschen auf dem Planeten, welche die Binär verstehen, und welche die es nicht tun. -Ursprüngliche Nachricht- Von: Shane

AW: Problems installing Nessus

2003-08-07 Thread Meidinger Chris
i am not a huge proffesional in GUI stuff, but you can have GTK 1 and GTK 2 both installed for programs that use them. did you try looking for a binary package (RPM) of nessus? I could have sworn they existed. (This may be completly unwanted advice, but i recommend against starting with redhat as

AW: Windows XP computer spewing packets

2003-08-06 Thread Meidinger Chris
18 packets / sec when each port is being opened (meaning not in an ongoing TCP Connection, but for example in a port scan) is a good average badenIT GmbH System Support Chris Meidinger Tullastrasse 70 79108 Freiburg __ Es gibt 10 arten von Menschen auf dem Planeten, welche die Bin

AW: cracking tool named 'nc' ?

2003-07-11 Thread Meidinger Chris
Great answer Ivan, i was going to write the same mail but you did it for me. One more word of advice: DON'T just run it without checking what it is. It may well be something evil with a benign name. Also, take a search on google for "incident handling" and look into what you should do after gett

AW: Multi-User Access to Password Database

2003-07-11 Thread Meidinger Chris
Hi John, how often do these people need to learn new passwords? Most companies that i have been involved with have one super-person (usually something close to a board member - or in German often the Prokurist, no idea what that title is called in English) who keeps the list and gives passwords o

AW: What runs on TCP 55317?

2003-07-09 Thread Meidinger Chris
If they are internal addresses, have you: 1. checked to see if the machine is alive (ping or a 'polite' port scan) - if it is, ask the operator if he knows anything, or ask to be allowed to check yourself what is running on it. It's possible that it is not a spoofed address but rather an infected

AW: Getting an IP address from a MAC address

2003-07-09 Thread Meidinger Chris
if you are in a windows environment, nbtstat -c -a NetBIOS_Name will provide you with the remote NetBIOS table and MAC Address. Not sure if someone mentioned this before, i was only skimming the thread. I just ran across this doing an nbtstat and remembered that people had been talking about mac a

AW: Ten least secure programs

2003-07-08 Thread Meidinger Chris
Hey, even Trinity exploited SSH in The Matrix. How hard can it be? It's like anything else: there is the occaisonal 'sploit, but misconfiguration is the real danger. badenIT GmbH System Support Chris Meidinger Tullastrasse 70 79108 Freiburg -Ursprüngliche Nachricht- Von: Chris Berry [m

AW: Proxy Server

2003-07-08 Thread Meidinger Chris
Woah slow down there pardner. If you buy any proxy server because it can do "etc." then you made a bad decision. Tell us more exactly what you want and we can recommend, but there are a lot of proxy servers that support etc. badenIT GmbH System Support Chris Meidinger Tullastrasse 70 791

AW: Best Linux Distribution for laptop - Debian is not proper for laptop?

2003-07-08 Thread Meidinger Chris
I use gentoo linux from www.gentoo.org on all my boxes, both my private and work machines. Runs great on an IBM T23, and i've had it on T21, A31p and other Lappys. It's worth a look for sure. badenIT GmbH System Support Chris Meidinger Tullastrasse 70 79108 Freiburg -Ursprüngliche Nachric

AW: Central Win2000 auditing logs

2003-07-07 Thread Meidinger Chris
se 70 79108 Freiburg -Ursprüngliche Nachricht- Von: Chris Alliey [mailto:[EMAIL PROTECTED] Gesendet: Saturday, July 05, 2003 1:05 AM An: 'Meidinger Chris'; 'Stephen Gay' Cc: '[EMAIL PROTECTED] Com (E-Mail)' Betreff: RE: Central Win2000 auditing logs Are you

AW: Central Win2000 auditing logs

2003-07-04 Thread Meidinger Chris
We did it with a .hta application and an access databank. We have about a meg of log per server per day. That puts us between 75 and 80 megs per day. So our database filters out the 'known uninteresting' events, and that leaves about 1 meg per day. We do it once daily, but if you wanted to you c

AW: Port scanning question

2003-07-03 Thread Meidinger Chris
Snort is an Open Source IDS - Intrusion Detection System - that will detect Port Scans. I recommend reading "Network Intrusion Detection - An Analyst's Handbook" by Stephen Northcutt and Judy Nowak from New Rider's Press to get a good start in the topic. Then start setting up an IDS System, and j

WG: Security issue in Windows 2000?

2003-07-03 Thread Meidinger Chris
Hello Hong, this DOES happen on Windows NT. This is a 'feature' of NTLM Authentication. You can, in fact, set your local administrator password to the same thing as the domain administrator and have domain admin priveliges everywhere. Anyway, it's not a bug, but a feature. If you move your domain