Re: Distressing, possibly life threatening emails from free accounts (yahoo, hotmail

2003-05-31 Thread khayes
Unfortunately there isn't a clear way to do this since Yahoo is the middle guy and the mail headers were generated there. We recently had a similar e-mail come in and we spoke to Yahoo directly. While they were sympathetic to the situation, they stated some sort of Court Order or Law

Re: access-list at 4006 catalyst switch?

2003-03-05 Thread khayes
$)C Sure you can. I did it on the Cat4000 series switches I have here. It's rather easy to implement actually. The information I think you're looking for is in Chapter 17 of the Software Configuration Guide for the switches themselves. I believe it's entitled Configuring the IP Permit List.

Re: MS IIS 5 server is hacked leaving undeletable folders and files

2003-01-02 Thread khayes
If it makes you feel better you're definately not alone in this. It happens to hundreds of people every day. It had happened to a server I inherited when I started this job and they couldn't figure it out either. The only reason I know about the fix is because I was an idiot and created a COM1

RE: Exploit Tool

2002-11-11 Thread khayes
Unfortunately, I've never used Retina Scanner so I'm probably not in the position to claim who's copying who. (smile) I do know that currently SSS holds the spot as the 'preferred tool' for exploit identification in the warez/hacking scene. I've seen it used a number of times on compromised

Re: Secure e-mail

2002-11-09 Thread khayes
I'd suggest getting on the support site at Microsoft as a place to start. (http://support.microsoft.com) Do a search for Security in the Outlook client, not Outlook Express. I know it can encrypt e-mail on the send (client side encryption before it sends the e-mail over the wire). I wouldn't

Re: Exploit Tool

2002-11-09 Thread khayes
Shadow Security Scanner is currently the hot tool in the exploit checking circles. It's exploit DB is regularly updated with the latest and greatest. It not only checks to see if the exploit exists, it tests the exploit and then reports back it's findings. - You can customize your scans to

Re: Slow scan on high-ports?

2002-10-29 Thread khayes
Often the folks in the Warez scene will hack into a machine and install a hidden FTP server set to run on these higher port numbers. The idea being that they are safe because so few applications/services actually use these ports the network/systems admins won't think to look there. Ken

Re: Can't Resolve from behind firewall

2002-10-17 Thread khayes
Have you tried taking at a look at the network traffic to see if the two DNS servers are even getting past the handshake phase? From the limited information I have, I'd have to venture a guess that they're not. Ken Hayes Network Administrator Eastbay / Footlocker.com Wausau, WI Offices (715)

RE: WIRELESS THEFT

2002-10-17 Thread khayes
If nothing else I'd suggest the implement strong WEP keys. Sure someone would be able to tell there's a wireless network out there but without the WEPs, they won't be able to jump on the network. It still leaves them vulnerable to DoS attacks on it but that's an entirely different issue they