is, but in previous investigations at my
company, we have had to be very careful in these areas.
Matthew
- Original Message -
From: "Potter, Tim" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, June 12, 2003 5:12 PM
Subject: RE: How to obtain a yahoo userna
On Fri, 13 Jun 2003, M. Lucas wrote:
> Kelly,
>
> first: welcome as our new moderator...
Thanks.
> Can you post a list statistics of the amount of
>
> spam:
> rejected questions:
> rephrased accepted questions
> total amount
>
> emails you get a day/week on this list?
I don't have stats on thes
, June 12, 2003 1:41 PM
To: [EMAIL PROTECTED]
Subject: Re: How to obtain a yahoo username off a computer
On Thu, Jun 12, 2003 at 11:47:32AM -0500, Potter, Tim wrote:
> Except that this person will be 'asked to leave' once we are sure they
> sent the offended emails to our business partn
Message-
From: Potter, Tim [mailto:[EMAIL PROTECTED]
Sent: Thursday, June 12, 2003 1:50 PM
To: [EMAIL PROTECTED]
Subject: RE: How to obtain a yahoo username off a computer
Okay - things have changed quite bit. What is a good
keystroke-logger?
Thanks!
-Original Message-
From: J
PROTECTED]'
Subject: RE: How to obtain a yahoo username off a computer
Tim,
Have you considered the possibility that the mail headers were forged to
implicate an innocent third party?
-Damian
> -Original Message-
> From: Potter, Tim [mailto:[EMAIL PROTECTED]
> Sent: Thursday
On Thu, 2003-06-12 at 16:13, Kelly Martin wrote:
> I receive posts to the list on a daily basis that appear to be questions
> on how to circumvent security. Those that are so obvious are rejected
> outright with standard explanation, and in some cases people respond by
> rephrasing th
TED]
Sent: Thursday, June 12, 2003 13:50
To: [EMAIL PROTECTED]
Subject: RE: How to obtain a yahoo username off a computer
Okay - things have changed quite bit. What is a good keystroke-logger?
Thanks!
-Original Message-
From: Jon Baer [mailto:[EMAIL PROTECTED]
Sent: Wednesday, June 11, 2003
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Friday 13 June 2003 00:47, Potter, Tim wrote:
> Except that this person will be 'asked to leave' once we are sure they
> sent the offended emails to our business partner. So we need to be as
> close to 100% as possible. Even though this is employ
On Thu, Jun 12, 2003 at 11:47:32AM -0500, Potter, Tim wrote:
> Except that this person will be 'asked to leave' once we are sure they
> sent the offended emails to our business partner. So we need to be as
> close to 100% as possible.
Well, if you have access to those emails, verbatim, then there
Wednesday, June 11, 2003 15:44
> To: [EMAIL PROTECTED]
> Cc: security-basics
> Subject: RE: How to obtain a yahoo username off a computer
>
> Curt is absolutely right... I was amazed at how quickly
> people responded with various mechanisms to do what was
> originally ask
ogger?
Thanks!
-Original Message-
From: Jon Baer [mailto:[EMAIL PROTECTED]
Sent: Wednesday, June 11, 2003 9:06 PM
To: [EMAIL PROTECTED]
Subject: Re: How to obtain a yahoo username off a computer
You could do it with a sniffer but if that's if you want to sit around
for 24x7 and wait
> To: Tim Laureska
> Cc: [EMAIL PROTECTED]; security-basics
> Subject: RE: How to obtain a yahoo username off a computer
>
>
> I receive posts to the list on a daily basis that appear to be questions
> on how to circumvent security. Those that are so obvious are rejected
gt; Subject: RE: How to obtain a yahoo username off a computer
>
>
> Except that this person will be 'asked to leave' once we are sure they
> sent the offended emails to our business partner.
---
E
comprehensive and are pretty inexpensive as well
-Original Message-
From: Potter, Tim [mailto:[EMAIL PROTECTED]
Sent: Thursday, June 12, 2003 1:50 PM
To: [EMAIL PROTECTED]
Subject: RE: How to obtain a yahoo username off a computer
Okay - things have changed quite bit. What is a good
Okay - things have changed quite bit. What is a good keystroke-logger?
Thanks!
-Original Message-
From: Jon Baer [mailto:[EMAIL PROTECTED]
Sent: Wednesday, June 11, 2003 9:06 PM
To: [EMAIL PROTECTED]
Subject: Re: How to obtain a yahoo username off a computer
You could do it with a
hoping for some "quick trick" that someone knew of so we wouldn't have
> to go through all the sniffer work. We don't own any sniffers and
> will have to download and install something.
>
> -Original Message-
> From: Times Enemy [mailto:[EMAIL PROTECT
act
accordingly.
"As long as technology exists, security or lack there of, will exist"
-Original Message-
From: Kelly Martin [mailto:[EMAIL PROTECTED]
Sent: Thursday, June 12, 2003 12:28 PM
To: Tim Laureska
Cc: [EMAIL PROTECTED]; security-basics
Subject: RE: How to obtain a yaho
fer work. We don't own any sniffers and will
have to download and install something.
-Original Message-
From: Times Enemy [mailto:[EMAIL PROTECTED]
Sent: Thursday, June 12, 2003 12:19 AM
To: [EMAIL PROTECTED]
Subject: Re: How to obtain a yahoo username off a computer
Greets.
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Thursday 12 June 2003 09:44, Tim Laureska wrote:
> Curt is absolutely right... I was amazed at how quickly people responded
> with various mechanisms to do what was originally asked... I would hope
> that the new Security Basics List administrator m
M
To: [EMAIL PROTECTED]
Subject: Re: How to obtain a yahoo username off a computer
There's been a variety of helpful responses to the original request now.
There are good reasons for doing what he wants to do, but (and I'm in no
way impuning the original poster by asking this) there are
In Win2k, there should be a folder named with the same name as the yahoo
user in his/her "My Documents" folder. (At least there is on mine -
Win2k pro sp3)
regards,
jamie
Fred W. Noltie Jr. wrote:
Mike Dresser wrote:
Create a webbug on a server you control(1x1 pixel .jpg or something)
Email
I receive posts to the list on a daily basis that appear to be questions
on how to circumvent security. Those that are so obvious are rejected
outright with standard explanation, and in some cases people respond by
rephrasing their question, indicating the legitimate purpose of such a
request, and
>Hello! We have a security issue and need to know who is using a
>particular Yahoo user ID from within our company. We are about 90%
>certain of the person's identity.
Three words for you: CAN OF WORMS
Run this by your legal department before doing anything.
That said, people have come up
Hi, guys!
I want to write a CGI Scanner, and want to support proxy scan, but i don't know how to
send a request to a proxy server.
Usually cgi scan is sending a "GET /cgi-bin/cgifile.cgi HTTP/1.0\r\n" , but if user
set a proxy server's IP addrs, port and TCP or UDP ,the
On 2003-06-11 Curt Seeliger wrote:
> There's been a variety of helpful responses to the original request
> now. There are good reasons for doing what he wants to do, but (and
> I'm in no way impuning the original poster by asking this) there are
> some crummy reasons as well.
>
> How do any of yo
Ref: Potter, Tim <[EMAIL PROTECTED]>'s
message dated Wednesday, June 11, 2003, 15:00 hours.
>Hello! We have a security issue and need to know who is using a
>particular Yahoo user ID from within our company. We are about 90%
>certain of the person's identity. This user has been deleting
mit though, that i do find it humorous that someone with
the authority to use various sniffers and make network configuration
modifications would not think to use sniffers, or would not know how to
go from 0% to 90% but be stuck after gathering so much intel. I find
weeding that first 10% to be m
You could do it with a sniffer but if that's if you want to sit around for
24x7 and wait for it to happen in which case Id download Snort
(www.snort.org) and write a sig to trap the user, something like:
alert tcp $MY_NET any -> $YAHOO_SERVERS any (msg:"CHAT YAHOO my guy";
flow:to_server,establish
io, but isn't paranoia part of the game?
-Original Message-----
To: [EMAIL PROTECTED]
Subject: How to obtain a yahoo username off a computer
Hello! We have a security issue and need to know who is using a
particular Yahoo user ID from within our company. We are about 90%
certain of th
ne 11, 2003 7:53 PM
To: [EMAIL PROTECTED]
Subject: Re: How to obtain a yahoo username off a computer
There's been a variety of helpful responses to the original request now.
There are good reasons for doing what he wants to do, but (and I'm in no
way impuning the original poster by ask
-
From: Potter, Tim [mailto:[EMAIL PROTECTED]
Sent: Wednesday, June 11, 2003 1:01 PM
To: [EMAIL PROTECTED]
Subject: How to obtain a yahoo username off a computer
Hello! We have a security issue and need to know who is using a
particular Yahoo user ID from within our company. We are about 90%
Why not just keep a watchful eye on the person you're suspecting? You know,
walk by his desk/office a little more often than normal, stuff like that.
If possible, install some remote administration tools (like Brian Carpio
suggested) to monitor what he is doing. Or take the more direct route and
Mike Dresser wrote:
Create a webbug on a server you control(1x1 pixel .jpg or something)
Email the yahoo account, and when he opens it, it will download the
webbug, and that will show up on your machine with a time, ip(which would
belong to your netblock), and the url that he accessed.
Send the
a stalking, or background info
for more social engineering, or yada? Near as I know, you don't. Sure,
this is worst case scenario, but isn't paranoia part of the game?
> -Original Message-
> To: [EMAIL PROTECTED]
> Subject: How to obtain a yahoo username off a compu
Not that I want to see you go, but I've had numerous requests today on how
to unsubscribe [sniff, sniff]. Here's how you do it:
Easiest way is to go to our website
(http://www.securityfocus.com/archive), click on Security-Basics, enter
your email address and click 'unsubscribe
2003 4:01 PM
To: [EMAIL PROTECTED]
Subject: How to obtain a yahoo username off a computer
Hello! We have a security issue and need to know who is using a
particular Yahoo user ID from within our company. We are about 90%
certain of the person's identity. This user has been deleting his
cooki
And there's always the use of a keyboard logger. . .
-Original Message-
From: dave [mailto:[EMAIL PROTECTED]
Sent: Wednesday, June 11, 2003 6:23 PM
To: 'Potter, Tim'; [EMAIL PROTECTED]
Subject: RE: How to obtain a yahoo username off a computer
You can still pull his hist
The easiest way I can think of would be to sniff the network traffic
originating from that IP on your internal network. You could restrict
you sniffing to only packets bound for port 80, 110, 25, etc depending
on how the Yahoo! account is being used. If you could covertly place
their ethernet con
On Wed, 11 Jun 2003, Potter, Tim wrote:
> Hello! We have a security issue and need to know who is using a
> particular Yahoo user ID from within our company. We are about 90%
> certain of the person's identity. This user has been deleting his
> cookies and temp Internet files. We want to searc
--
> From: Potter, Tim [mailto:[EMAIL PROTECTED]
> Sent: Wednesday, June 11, 2003 1:01 PM
> To: [EMAIL PROTECTED]
> Subject: How to obtain a yahoo username off a computer
>
> Hello! We have a security issue and need to know who is using a
> particular Yahoo user ID from with
From: "Potter, Tim" <[EMAIL PROTECTED]>
Hello! We have a security issue and need to know who is using a
particular Yahoo user ID from within our company. We are about 90%
certain of the person's identity. This user has been deleting his
cookies and temp Internet files. We want to search his com
Slap a sniffer on the network, as far as I remember it is unencrypted,
or use a key logger, sod the ethics, law etc
-Original Message-
From: Potter, Tim [mailto:[EMAIL PROTECTED]
Sent: 11 June 2003 21:01
To: [EMAIL PROTECTED]
Subject: How to obtain a yahoo username off a computer
]
www.netmedic.net
-Original Message-
From: Potter, Tim [mailto:[EMAIL PROTECTED]
Sent: Wednesday, June 11, 2003 16:01
To: [EMAIL PROTECTED]
Subject: How to obtain a yahoo username off a computer
Hello! We have a security issue and need to know who is using a
particular Yahoo user ID from within
im [mailto:[EMAIL PROTECTED]
Sent: Wednesday, June 11, 2003 2:01 PM
To: [EMAIL PROTECTED]
Subject: How to obtain a yahoo username off a computer
Hello! We have a security issue and need to know who is using a
particular Yahoo user ID from within our company. We are about 90%
certain of the person&
You will find the User ID in the registry
"HKEY_CURRENT_USER\software\Yahoo\Pager"
-Original Message-
From: Potter, Tim [mailto:[EMAIL PROTECTED]
Sent: Wednesday, June 11, 2003 1:01 PM
To: [EMAIL PROTECTED]
Subject: How to obtain a yahoo username off a computer
Hello!
Hello! We have a security issue and need to know who is using a
particular Yahoo user ID from within our company. We are about 90%
certain of the person's identity. This user has been deleting his
cookies and temp Internet files. We want to search his computer to see
if Yahoo ID is somewhe
Hi All,
Is there any way/command through which i can change windows internet proxy
setting? I am testing the achilles tool & by using that i want to check how
session ids could be used to steal the authentication. But for that i want
to change proxy setting of some another machine (on the same net
> -Original Message-
> From: Marc Thomas [mailto:[EMAIL PROTECTED]]
> Sent: Friday, December 20, 2002 1:01 PM
> To: James-lists
> Subject: RE: syslog server- how to on Linux
>
>
> I also have to agree.
>
> I went through this very issue when building m
> I use Linux here as well, but I have to contradict you on
this one. The man
> pages (in my opinion) do not explain anything, they merely
remind you of the
> relevant command syntax if you already know what you're
doing. Info pages
> are a bit better, but don't even come close to being
availabl
16, 2002 1:01 PM
> To: netsec novice
> Cc: [EMAIL PROTECTED]
> Subject: Re: syslog server- how to on Linux
>
>
> man syslogd
>
> understand how to use syslog.conf file
>
> there are number of logging parsing tools out there such as
> logsentry by
> psionic?
&
in my opinion) do not explain anything, they merely remind you of the
relevant command syntax if you already know what you're doing. Info pages
are a bit better, but don't even come close to being available for most
commands. What he's looking for is a How-To type document, the
man syslogd
understand how to use syslog.conf file
there are number of logging parsing tools out there such as logsentry by
psionic?
no flame, welcome to the world of linux and good luck. check out your
local lug to get involved and learn about linux.
/gene
netsec novice wrote:
I'm h
> http://www.balabit.hu/en/downloads/syslog-ng/
You will want to take a look at this one, the syslog that
ships with most linux distros
does not allow you to filter incoming remote syslog very
well. All remote syslog info
will also get written to messages along with the local
facility specified o
- Original Message -
From: "netsec novice" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, December 13, 2002 10:34 PM
Subject: syslog server- how to on Linux
>
>
>
> I'm hoping I don't generate flames because this is somewhat off-
it.hu/en/downloads/syslog-ng/
-Original Message-
From: netsec novice [mailto:[EMAIL PROTECTED]]
Sent: Friday, December 13, 2002 3:35 PM
To: [EMAIL PROTECTED]
Subject: syslog server- how to on Linux
I'm hoping I don't generate flames because this is somewhat off-topic but I
have been go
You must use the "-r" switch for "remote" logging i.e. syslogd -r
Syslog usually listens on 514/udp.
On client machines you must set your syslog.conf to log to a remote
server with an entry like *.* @server.ip.address.
On Fri, 2002-12-13 at 20:34, netsec novice wrote:
> I'm hoping I don't gener
Hi,
show entries at the end of the file
# tail /var/log/messages
show entries at the beginning of the file
# head /var/log/messages
use the -n switch to set the number of lines to view
to scroll through the whole file
# more /var/log/messages
to view the file in real time
# tail -f /var/log/
Hi,
if you want to enable syslogd listening on the network you have to start it
with the '-r' commandline switch - now you only have to find where to specify
this option (perhaps init script in /etc/init.d or similar) - I think the
suse mailing list should know about it.
Regards
Daniel
Am Fr
Your syslog is in a file called syslog, probably in /var/log/syslog, if
its not there try to updatedb and locate syslog. To view the syslog you
use a normal text-editor, eg vi(m), pico,..
or if your searching for something within the syslog, try cat syslog |
grep
Hope this helps you out
Krist
On Fri, 13 Dec 2002 20:34:43 +
"netsec novice" <[EMAIL PROTECTED]> wrote:
> What is the method to viewing
> logs on Linux?
Something like
cd /var/log
less messages
but double check with your /etc/syslog.conf to find out
the name of various log files on Suse.
> Typing syslogd at th
ovice [mailto:[EMAIL PROTECTED]]
> Sent: Friday, December 13, 2002 21:35
> To: [EMAIL PROTECTED]
> Subject: syslog server- how to on Linux
>
>
> I'm hoping I don't generate flames because this is somewhat
> off-topic but I
> have been googling for a while and I
PROTECTED]]
Sent: Friday, December 13, 2002 2:35 PM
To: [EMAIL PROTECTED]
Subject: syslog server- how to on Linux
I'm hoping I don't generate flames because this is somewhat off-topic but I
have been googling for a while and I'm not getting the answer I'm looking
for. I need
"netsec novice" <[EMAIL PROTECTED]> wrote ..
> I'm hoping I don't generate flames because this is somewhat off-topic but
> I
> have been googling for a while and I'm not getting the answer I'm looking
> for. I need information on how I view or set up syslog on a Linux platform
> (specifically SuS
On 13/12/02 20:34 +, netsec novice wrote:
> I'm hoping I don't generate flames because this is somewhat off-topic but I
> have been googling for a while and I'm not getting the answer I'm looking
> for. I need information on how I view or set up syslog on a Linux platform
Logs generally ten
/var/log/messages)...
To view it on your console try to tail it:
tail -f /var/log/messages
(do a man tail to learn all options of the tail command).
> My first project is to set it up as a syslog security server.
I suppose you want a remote syslog server...
Mmmm... this one is a cool articl
On Fri, 2002-12-13 at 12:34, netsec novice wrote:
Typing syslogd at the command line tells me that syslogd is
> already running but I don't see it listening as a service when I type
> netstat -an.
syslogd normally binds to udp port 514. However, if it's started with
flags -ss it will bind to n
I'm hoping I don't generate flames because this is somewhat off-topic but I
have been googling for a while and I'm not getting the answer I'm looking
for. I need information on how I view or set up syslog on a Linux platform
(specifically SuSE 8.1) I am BRAND new to Linux and purchased SuSE to
Win9x/ME/NT/2K/XP: SysInternals, get TCPView or TDIMon
WinNT/2K/XP: Foundstone, get fport.exe
Several folks, to include noted SANS instructors, will
point you toward a program called "inzider", referring
to it as "lsof for Windows". However, none of them
have bothered to read the author's web sit
Scanrand - http://www.doxpara.com/read.php/docs/scanrand_logs.html, fastest
way.
At 05:52 PM 12/6/2002 +0530, YashPal Singh wrote:
Hi All,
How we can search all the alive machines on the network. Say my network is
10.60.0.0 to 10.60.255.255. So what are the different ways(pros and cons) to
searc
Check out DoxPara research (http://www.doxpara.com) . The product Paketto
Keirtsu is worth a try.
A description of what all it does is available here:
http://www.doxpara.com/read.php/docs/pk_english.html
Get it at http://www.doxpara.com/paketto/paketto-1.0.tar.gz
Hope this helps.
With Regards,
[mailto:[EMAIL PROTECTED]]
Sent: Tuesday, December 10, 2002 4:42 AM
To: YashPal Singh
Cc: '[EMAIL PROTECTED]'; '[EMAIL PROTECTED]'
Subject: RE: how to search all machines on a network.
Singh,
This is how I would do this though it is probably not the easiest nor the
best. Firs
gh Gill [mailto:[EMAIL PROTECTED]]
> Sent: Saturday, December 07, 2002 8:43 AM
> To: 'YashPal Singh'
> Subject: RE: how to search all machines on a network.
>
>
> I would recommend this too..
>
> -Original Message-
> From: Matt Schaelling [mailto:[EMAIL P
PROTECTED]>,
"'[EMAIL PROTECTED]'"
<[EMAIL PROTECTED]>
12/07/02 04:07Subject: Re: how to search all machines
on a network.
You should be able to specify some options with the net ping command that
will allow you to do this.
_
Webmail provided by Names.co Internet plc
http://www.names.co.uk
--
From: Sarbjit Singh Gill [mailto:[EMAIL PROTECTED]]
Sent: Saturday, December 07, 2002 8:43 AM
To: 'YashPal Singh'
Subject: RE: how to search all machines on a network.
I would recommend this too..
-Original Message-
From: Matt Schaelling [mailto:[EMAIL PROTECTED]]
Sent: Saturday,
-Ursprungliche Nachricht-
> Von: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
> Gesendet: Mittwoch, 4. Dezember 2002 18:43
> An: Robert Sieber; [EMAIL PROTECTED]
> Betreff: RE: How to authentificate an user via telephon?
>
>
> Robert,
>
> In a past life we would send t
at kind of client recon you doing it for? mixed?
Graepel, Mark D - CNF wrote:
Foundstone tool called SuperScan works quite well.
-Original Message-
From: YashPal Singh [mailto:[EMAIL PROTECTED]]
Sent: Friday, December 06, 2002 4:23 AM
To: '[EMAIL PROTECTED]'
Cc: '[EMAIL PROTE
Cheops..
Will do OS regonition, and give you a nice little diagram at the end of
it...
can go
into a lot of detail if you have SNMP support available.
-Original Message-
From: Matt Schaelling [mailto:[EMAIL PROTECTED]]
Sent: Friday, December 06, 2002 11:41 AM
To: 'YashPal Singh'; '[EMAIL PROTECTED]'
Cc: '[EMAIL PROTECTED]'
Subject: RE: ho
nmap 10.60.0.0/16
you can do it on linux/Windows. do a search on nmap's help to see his
great potential.
Cheers,
_CRIS
+---+=*@*=++
| ing. Cristian Arustei netadmin@ misp.tuiasi.ro |
| +4-0723.315.830
Chris Berry wrote:
From: YashPal Singh <[EMAIL PROTECTED]>
How we can search all the alive machines on the network. Say my
network is 10.60.0.0 to 10.60.255.255. So what are the different ways
(pros and cons) to search all the machines.
use nmap or cheops
--
---It's almost never the $100
and thanks a lot again.
Yash
-Original Message-
From: Sarbjit Singh Gill [mailto:[EMAIL PROTECTED]]
Sent: Saturday, December 07, 2002 8:43 AM
To: 'YashPal Singh'
Subject: RE: how to search all machines on a network.
I would recommend this too..
-Original Message-
'[EMAIL PROTECTED]'
> Cc: '[EMAIL PROTECTED]'
> Subject: how to search all machines on a network.
>
>
> Hi All,
>
> How we can search all the alive machines on the network. Say my network is
> 10.60.0.0 to 10.60.255.255. So what are the different ways(pros
IL PROTECTED]]
> Sent: Friday, December 06, 2002 4:23 AM
> To: '[EMAIL PROTECTED]'
> Cc: '[EMAIL PROTECTED]'
> Subject: how to search all machines on a network.
>
>
> Hi All,
>
> How we can search all the alive machines on the network. Say
> my
Sorry, hit send before I could include the link.
www.solarwinds.net
-Original Message-
From: Matt Schaelling [mailto:[EMAIL PROTECTED]]
Sent: Friday, December 06, 2002 11:41 AM
To: 'YashPal Singh'; '[EMAIL PROTECTED]'
Cc: '[EMAIL PROTECTED]'
Subject: RE: h
From: YashPal Singh <[EMAIL PROTECTED]>
How we can search all the alive machines on the network. Say my
network is 10.60.0.0 to 10.60.255.255. So what are the different ways
(pros and cons) to search all the machines.
There are a bunch of different ways to do this depending on your knowledge,
av
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
YashPal Singh,
A way to determine if systems are alive is to do a ping sweep across
a range of IP addresses you determine. There are various tools you
can use, such as nmap and fping for UNIX, and SuperScan and ipEye for
Windows. There are other too
The easiest way to do this is probably with a portscanner.
Just aim it at 10.60.0.0/16 and see what you come up with.
Nmap (http://www.nmap.org/) would probably do what you need.
- neal
On Fri, Dec 06, 2002 at 05:52:36PM +0530, YashPal Singh wrote:
> Hi All
Just do a Ping Sweep with Nmap using 10.60.*.* address. It will
show you all the machines alive.
Nmap can be downloaded for free from
http://www.insecure.org/namp
Regards,
assassin007
On Fri, 06 Dec 2002 YashPal Singh wrote :
Hi All,
How we can search all the alive machines on the network. Sa
Use nmap.
nmap -sP 10.60.0.0/16
-ansh
> -Original Message-
> From: YashPal Singh [mailto:[EMAIL PROTECTED]]
> Sent: Friday, December 06, 2002 4:23 AM
> To: '[EMAIL PROTECTED]'
> Cc: '[EMAIL PROTECTED]'
> Subject: how to search all machines on a ne
From: "Gary Turovsky" <[EMAIL PROTECTED]>
> I also recommend PasswordSafe from www.counterpane.com its a free
> product that allows you to manage multiple passwords in a secure
> 448bit blowfish encrypted storage. (that should help your users from >
forgetting their passwords all the time)
Except
er 06, 2002 12:22 PM
Subject: how to search all machines on a network.
> Hi All,
>
> How we can search all the alive machines on the network. Say my network is
> 10.60.0.0 to 10.60.255.255. So what are the different ways(pros and cons)
to
> search all the machines.
>
> Thanks in advance,
> Yash
The simplest on-demand way would be to ping the entire range, the
simplest pseudo-live way would be to have every machine send a heartbeat
once in a while (using SNMP for example).
YashPal Singh wrote:
>Hi All,
>
>How we can search all the alive machines on the network. Say my network is
>10.60.0
Maybe I'm the only one who doesn't understand your question completely, but what are
you wanting to scan for.. just to see if the machines are up (online), or are you
looking for open ports etc... ? Any specifics ?
shayla
Foundstone tool called SuperScan works quite well.
-Original Message-
From: YashPal Singh [mailto:[EMAIL PROTECTED]]
Sent: Friday, December 06, 2002 4:23 AM
To: '[EMAIL PROTECTED]'
Cc: '[EMAIL PROTECTED]'
Subject: how to search all machines on a network.
Hi All,
H
You know, maybe I'm paranoid/delusional, but I'd never use SSN (or part thereof) or
birth date as authenticators.
First of all, I believe that the SSN _should_ be highly private and restricted
information. The only people who should be able to access this data are HR people
with a need to kn
> I have to say that I think thats a very insecure
> authentication method. Our
> company deals heavily with finding people, and getting
> information about
> them, and I can say from experience here that getting
> someone's SSN and
> birthdate is a trivial task. You'd be much better off
Hi all
on a conference some days ago, somebody told me about a system called "VoiceTrust".
Had a google on that and found this URL: http://www.voicetrust.de.
I have no experience with this product yet, but it sounds quite interesting
and the guy who pointed me on this told me also that it is used
Valter,
I do agree with on your point, if social engineering is involved, and as
attempt is made by someone with the utmost desire to get through would
be able to obtain, any means necessary to get the information they
require by doing recon on human infrastructure. Let's not forget about
the
Hi All,
How we can search all the alive machines on the network. Say my network is
10.60.0.0 to 10.60.255.255. So what are the different ways(pros and cons) to
search all the machines.
Thanks in advance,
Yash
1 - 100 of 272 matches
Mail list logo