Re: modifying SUID

2002-06-04 Thread jon schatz
On Mon, 3 Jun 2002, Eric wrote: However, this command works sometimes, and sometimes only results in a permission denied, operation not permitted message. For instance, /usr/bin/cu and /usr/bin/rsh resulted in that error message, but /usr/bin/lpr did work. Why the difference? sounds

Re: AOL Asking for Confidentail Data in Unsecured Environment

2002-05-09 Thread jon schatz
On Tue, 2002-05-07 at 07:11, [EMAIL PROTECTED] wrote: Hi Guys: I got a surprise this morning when I tried to change my credit card payment on AOL. It is asking you to place credit card information or checking information in a unsecured form (Dialogue box) . i don't have access to an aol

Re: FW Iptables? IPF? PF?

2002-04-08 Thread jon schatz
On Fri, 2002-04-05 at 10:05, Thiago Mello wrote: The Iptables runs in freebsd runs in FreeBSD and Linux cause its runs linux binary, is this correct? no. iptables is linux 2.4 specific. the code is based in the kernel, so just because you can run the command line iptables command doesn't mean

Re: LOGWATCH EXPLOIT ROOT COMPROMISE

2002-03-29 Thread jon schatz
On Thu, 2002-03-28 at 22:14, Bailey Kong wrote: the current work around i got was to chattr +i /etc/passwd that makes it so /etc/passwd can't be modified, if and when you need to add a user you can simply do chattr -i /etc/passwd that's absolutely pointless under linux. the exploit allows

Re: a few questions, ipchains

2002-03-22 Thread jon schatz
On Wed, 2002-03-20 at 22:58, [EMAIL PROTECTED] wrote: on linux 2.2.19, slackware 8, i used ipchains -P input DENY, which returned no errors but when i try ipchains -A input -p tcp http -j ALLOW or ipchains -A input -p tcp http -j ACCEPT I get an error message? you really want :/sbin/ipchains

Re: smtp auth doubts

2002-03-12 Thread jon schatz
On Sat, 2002-03-09 at 18:07, [EMAIL PROTECTED] wrote: can anyone please who has done this sort of thing before elaborate more on pros and cons also can please send the snippet of actual code ( c, perl or any lang welcome ) that gets executed on client side while the smtp auth (plain) ( just

RE: scary site

2002-03-08 Thread jon schatz
On Wed, 2002-03-06 at 10:15, Mike Carney wrote: If you turn off active scripting in IE it stops it from happening. :( actually, you don't need active scripting enabled. see here: http://security.greymagic.com/adv/gm001-ie/ The downside is that a huge portion of the sites I visit

Re: Security Engineers Field Tool Kit

2002-03-06 Thread jon schatz
On Mon, 2002-03-04 at 17:06, Pradeep Pillai wrote: Folks, what would comprise a Network Enginners tool kit. ---snip--- What else can you think of ? at the rsa conference in san jose last month, @stake was giving out credit card sized cd's that were bootable x86 linux distros. i can't seem to

RE: How to search for sniffers on my RedHat Machine?

2002-03-03 Thread jon schatz
On Thu, 2002-02-28 at 12:39, Tony Fondo wrote: lsof is great also. except (usually) if someone's running a sniffer they've compromised the box already. in which case they've probably already trojaned all the binaries that could be used to identify their sniffer (including netstat, lsof, ps,

RE: The Best Network Scanner?

2002-03-01 Thread jon schatz
honestly, i've found the best network scanner to be nmap (http://www.insecure.org/nmap), and i'm surprised that no one's mentioned it so for. It's the swiss army knife of network testing tools. nessus actually uses it as its' scanning engine. It runs on *nix and win32 using libpcap. It supports

Re: Key Server...

2002-03-01 Thread jon schatz
On Wed, 2002-02-27 at 11:11, Sumit Dhar wrote: 2. How compatible are gnupg and pgp? http://www.gnupg.org/faq.html#q5 3. Lastly, anyone can send their keys to the keyserver. How does the keyserver authenticate that [EMAIL PROTECTED] is really X and not some impersonator?? Or is that beyond