iff.
Also if you are using hubs, it might be a good idea to switch to switches.
If you are interested, there is a brief document I had written on topic of
Sniffers that might be of use to you. It is available at
http://www.rootshell.be/~dhar/downloads/Sniffers.pdf
Hope this helps!!
With Regards,
Sum
,
Sumit Dhar
http://www.rootshell.be/~dhar
.xml file.
Also you will then need to specify the server port on the clients login
interface. Clients you can try are Winjab and Gabber.
As regards to clients supporting proxying, I am unfortunately, not very sure
at this point of time.
With Regards,
Sumit Dhar
http://www.rootshell.be/~dhar
ith Regards,
Sumit Dhar
http://www.rootshell.be/~dhar
or Linux, as that is the OS I will be working
on.
Thanks once again to all those who responded.
With Regards,
Sumit Dhar
http://www.rootshell.be/~dhar
ive a password to decrypt
his/her stuff.
-The root can delete the users files, but not read them.
-The whole process should ideally be completely transparent to the user.
Any pointers to programs that can do this on Linux??
With Regards,
Sumit Dhar
http://www.rootshell.be/~dhar
For example, if only the http
port is open such a user might not be able to use an exploit for ssh against
an external host.
Lots of small reasons like this why opening *ALL* outbound ports might not
be a great idea.
With Regards,
Sumit Dhar
http://www.rootshell.be/~dhar
be used.
With Regards,
Sumit Dhar
http://www.rootshell.be/~dhar
of the better books on this topic. The other book that you
might want to try is:
Maximum Linux Security
Cheers
Sumit Dhar [http://dhar.homelinux.com/dhar/]
Manager [Research and Product Development]
SLMsoft.com
--
pub 1024D/7AB2D05A 2002-02-24 Sumit Dhar (Sumi
uite a few details about these IPs.
Hope this helps.
Sumit Dhar [ http://dhar.homelinux.com/dhar ]
Manager [Research and Product Development]
SLMsoft.com
ngel
Hope this helps.
Cheers,
http://dhar.homelinux.com/dhar/>Sumit Dhar
Manager, Research and Product Development,
SLMsoft.com
to monitor, how much you are
willing to spend, what is the size of the network and the platform on
which you will install.
Somehow I have a feeling you are not looking for such a large scale
solution, are you??
http://dhar.homelinux.com/dhar/>Sumit Dhar
Manager, Research and Product Development,
SLMsoft.com
security related documentation.
I would prefer some kind of online documentation, white papers on these
topics.
With Regards,
http://dhar.homelinux.com/dhar/>Sumit Dhar
Manager, Research and Product Development,
SLMsoft.com
excels at it. If you have the budget you can always go
for a commerical program, but before you do that, give this little angel
a shot.. you might be surprised at what all it does.
Cheers
http://dhar.homelinux.com/dhar/>Sumit Dhar
Manager, Research and Product Development,
SLMsoft.com
Check out http://www.openfarm.org/article.php?story=2001102202250640
Sorry, shameless self plug :).
Had written the article some time back... just hope it helps! *W*
Cheers,
http://dhar.homelinux.com/dhar/>Sumit Dhar
Manager, Business Development and Products,
SLMsoft.com
u the IP etc.
Just my $0.02 worth.
http://dhar.homelinux.com/dhar/>Sumit Dhar
Manager, Business Development and Products,
SLMsoft.com
specifically books on Mathematics which might have the required
information.
Cheers and Regards,
Sumit Dhar [ http://dhar.homelinux.com/dhar/ ]
Manager, Research and Product Development,
SLMsoft.com
here:
http://www.redbooks.ibm.com/pubs/pdfs/redbooks/sg245512.pdf
Anyone aware of any similar online books?
Cheers,
http://dhar.homelinux.com/dhar/>Sumit Dhar
Manager, Research and Products,
SLMsoft.com
Cheers,
http://dhar.homelinux.com/dhar/>Sumit Dhar
Manager, Business Development and Products,
SLMsoft.com
enssl.org/docs/HOWTO/
http://developer.netscape.com/docs/manuals/security/sslin/contents.htm
And if you are looking to set up Apache+SSL, the SSL+Redhat howto might
help you...
Cheers,
http://dhar.homelinux.com/dhar/>Sumit Dhar
Manager, Business Development and Products,
SLMsoft.com
etuid bit from the ping program.
Can you post the output of ls -la /bin/ping ??
Regards
http://dhar.homelinux.com/dhar/>Sumit Dhar
Manager, Business Development and Products,
SLMsoft.com
--
Key fingerprint = 1C7E AACF 1EFC 1592 F18F 5121 AB9E 9995 E45B 7464
"Many that live deserv
and fed it to a dictionary program for
a password cracker.
Cheers,
http://dhar.homelinux.com/dhar/>Sumit Dhar
Manager, Business Development and Products,
SLMsoft.com
s that should give you a good starting point.
Hope this helps..
Regards
http://dhar.homelinux.com/dhar/>Sumit Dhar
Manager, Business Development and Products,
SLMsoft.com
--
Key fingerprint = 1C7E AACF 1EFC 1592 F18F 5121 AB9E 9995 E45B 7464
"Many that live deserve death. And some
Regards,
http://dhar.homelinux.com/dhar/>Sumit Dhar
Manager, Business Development and Products,
SLMsoft.com
s open. That could be just the webserver couldn't it?
Or am I missing something here. Is there some way to detect proxy
servers using Nmap?
With Regards,
http://dhar.homelinux.com/dhar/>Sumit Dhar
Manager, Business Development and Products,
SLMsoft.com
--
Key fingerprint = 1C7E AACF 1EFC
orks like Yahoo, World Comm etc.
With Regards
http://dhar.homelinux.com/dhar/>Sumit Dhar
--
Key fingerprint = 1C7E AACF 1EFC 1592 F18F 5121 AB9E 9995 E45B 7464
"Many that live deserve death. And some that die deserve life. Can you give it to them?
Then do not be too eager to deal out
Hello,
Would there be a proxy scanner which works under Linux, something like
Proxy Hunter that works on Windows?
Regards
Sumit Dhar
--
"Many that live deserve death. And some that die deserve life. Can you give it to
them?
Then do not be too eager to deal out death in judgement. For
th me and let us see if we can
produce such a document.
With Regards,
Sumit Dhar
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE8lQKAuQMMKXqy0FoRAoaaAKDlxpviMMtgG8JaZvURPkEJ8mKZggCfSG/g
cjckO7eMfkLfVrRsMI43Xoo=
=eCGc
-END PGP SIGNATURE-
port 1214. Users currently use a whole set of
filesharing programs.. Morpheus, Kazaa, Gnutella, Bearshare etc. etc.
Yes, it is possible to keep track of the programs being used, block each
one individually etc.
Would there be some kind of a generic way to block such P2P progs?
Regards
Dhar
On Wed, 6 Mar 2002 [EMAIL PROTECTED] wrote:
> one of my apache servers is being bombarded by some IPs (in different
There was a discussion about this some time back. One thing you might
want to try out is Early Bird.
http://www.treachery.net/~jdyson/earlybird/
Regards
Dhar
--
Smith &
totally obvious?
Also, if I am using gpg and know just my friends email ID, how can I
import his key. The command
gpg --keyserver "IP KS" --recv keys "username" doesnt work. It
needs the ID as the argument, not the username. Reading the man page
didnt seem to help. :(
g for Beginners" etc..
These articles, now I realize, never taught me how to hack... but they
did teach me the basics of systems security very well. If you are a
beginner, you might want to check these papers/articles out. They
certainly helped me a lot. Though, your mileage may vary...
Rega
broken into?
Regards
Dhar
--
Smith & Wesson: The original point and click interface.
pub 1024D/7AB2D05A 2002-02-24 Sumit Dhar (Sumit Dhar, SLMSoft.com) <[EMAIL PROTECTED]>
Key fingerprint = 4A18 D20D 3D15 6C5B CD2F 8E45 B903 0C29 7AB2 D05A
omeone asked for Basic Books on Encryption.
Oh, yes I agree with you Jay that even for this question google will
give you the answers. But if someone is asking this question he probably
doesnt know that "Applied Encryption by Bruce Schneier" is better that
"Dhar Explains Encryption&qu
According to this report http://www.mp3newswire.net/stories/2002/morpheushack.html
hackers brought down Morpheus for 2 days or more... Apparently the
hackers have also changed the registry settings on the users machines.
Regards,
Dhar
--
Smith & Wesson: The original point and click inter
ey??
I am currently trying out Mark Horowitz's pks and openkeyserver. Now,
just wondering if anyone here knows how this certifying could be done
on these keyservers??
Regards
Sumit Dhar
Will check it out sometime.
Regards
Dhar
PS: Most people assume, anyone interested in Crypto will have some
math/engg background to support it. Hence maybe the book Applied Crypto
gets suggested immediately.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see ht
st Regards,
Dhar
[EMAIL PROTECTED] is really X and not some
impersonator?? Or is that beyond the jurisdiction of the key server?
Does the key server also act as some sort of Certification Authority??
If no, how can I integrate these two functions?
With Regards
Sumit Dhar
- --
pub 1024D/7AB2D05A 2002-02-24 Sumit
TH00.NS.UU.NET 198.6.1.65
Information Source:
American Registry for Internet Numbers
Rgds
Dhar
t I would like ideally to do is to
have some kind of a program which lets a Network Admin know that a
machine is going into Promiscous Mode..
I too will keep looking and will let you people know if I find anything.
With regards,
Dhar
s his machine
completely as the root user, no user has access to every machine..
Regards
Dhar
tch/english.shtml
That should help. Ideally, I have been able to get dsniff running on 6.2
with out problems. Have had problems with later versions of RHL.
Currently I run with pretty smoothly on Mandrake 8.1
Rgds
Dhar
43 matches
Mail list logo