Search:

Type: Posts; User: z0mbi3; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.09 seconds.

  1. Thread: UDP port 1189

    by z0mbi3
    Replies
    1
    Views
    6,664

    UDP port 1189

    Recently I've been seeing a lot of UDP port 1189 probes to my workstation agent from various unrelated IP addresses. This activity looks like filesharing or maybe a new trojan. The port is listed as...
  2. Replies
    6
    Views
    5,628

    New unidentified trojan

    Check out the following articles. Does anybody have any idea when or what this new virus is?

    http://www.eweek.com/article2/0,3959,1130754,00.asp -New Trojan...
  3. Thread: Kuang2

    by z0mbi3
    Replies
    4
    Views
    7,167

    Kuang2

    I've recently noticed a large increase in Kuang2 port probes against my network. I done my research and it seems that more people that just myself are expericencing this increase in port 17300...
  4. Replies
    1
    Views
    3,881

    Checkpoint Management Client

    Can Windows XP support the Checkpoint Management Client(GUI)?
  5. Replies
    3
    Views
    4,145

    Novice apache permisions question

    I believe there are two (if not more) levels of permission to run apache under. I think one is equivalent to anonymous or a very restricted user. I think the other is equivalent to root, running...
  6. Thread: A+

    by z0mbi3
    Replies
    16
    Views
    19,384

    One thing I have to say about the A+ exam is that...

    One thing I have to say about the A+ exam is that its really not a measure of how much you know but of how well you can study.
  7. Replies
    1
    Views
    4,015

    Searching through ethereal

    Does anyone know the filter to use to search for a string of characters in the Ethereal data view pane?
  8. Replies
    2
    Views
    7,773

    Has anyone tried this out yet? I'm on question...

    Has anyone tried this out yet? I'm on question number 7 and seem to be stuck. What exactly am I looking for that would indicate part of a botnet?
  9. Replies
    1
    Views
    5,562

    If anyone cares, here's the article detailing...

    If anyone cares, here's the article detailing how.
    http://support.microsoft.com/default.aspx?scid=kb;en-us;216482
  10. Replies
    1
    Views
    5,562

    Disabling weak ciphers on IIS

    How do you disable weak SSLv3 & TSLv1 ciphers on IIS 5.0 server?
  11. Replies
    34
    Views
    16,912

    There is absolutely no way that this person...

    There is absolutely no way that this person worked for your ISP. Nobody from your ISP would identify themselves as a CCNP, how stupid. Most likely they are the person you were having trouble with...
  12. Replies
    2
    Views
    5,886

    here you go ...

    here you go

    http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=22029
  13. Replies
    2
    Views
    5,886

    WebDav Remote IIS Vulnerability exploit

    I've just seen the vulnerability warning and am curious if anyone knows where I could find the tool ISS or CERT talks about, or even the source code would be great, I'd be very thankful. I don't...
  14. Help me understand what Citrix does & how to secure it

    Recently I heard about a service called Citrix. I did some research about this and basically my understanding of this is a centralized management system for allowing access to applications on a...
  15. Replies
    1
    Views
    3,128

    Denying telnet access to Cisco routers

    Does anybody know the command to deny all telnet access to a router? I know how to specify it in the access list but I've heard that theres a simple command.
  16. Replies
    5
    Views
    5,833

    What's a red disk?

    Has anybody heard the term "red disk"? If so do you know what it means? I'm guessing it has something to do with hacking a Windows box if you have physical access but I really don't know if thats...
  17. Replies
    4
    Views
    5,658

    All reserved subnets???

    I'm looking for a complete list of all the reserved subnets. I know about
    10.0.0.0 - 10.255.255.255
    172.16.0.0 - 172.31.255.255
    192.168.0.0 - 192.168.255.255
    but I know...
  18. Thread: port 2417

    by z0mbi3
    Replies
    4
    Views
    4,144

    I know where its coming from but I need to know...

    I know where its coming from but I need to know why and what it does.
  19. Thread: port 2417

    by z0mbi3
    Replies
    4
    Views
    4,144

    port 2417

    I've noticed that lately I've been getting a lot of port probes directed at port 2417. I did some research and found out that it was Composit Server. I can't seem to find any sources on what this...
  20. Replies
    9
    Views
    6,280

    Thank you very much for this. I am taking my...

    Thank you very much for this. I am taking my Security+ tommorrow.
  21. Thread: Telnet abuse

    by z0mbi3
    Replies
    5
    Views
    6,388

    Telnet abuse

    I know you can telnet to SMTP, POP, IMAP, and FTP, send mail, download mail and download files with these services. I know this is a security concern and there are several ways to protect this from...
  22. Replies
    1
    Views
    3,830

    Obtaining Solaris

    Perhaps you guys could help me out. I've just got my Linux basics down and would now like to start playing around with Solaris x86. Peferrably 8 or 9. I know that Sun used to allow the download...
  23. Replies
    9
    Views
    8,917

    In order to correctly spoof an IP address you...

    In order to correctly spoof an IP address you must not only use the -P0 option but you must also specify what interface you are you using. Like so:


    nmap -sS -e eth0 -P0 -S 255.255.255.255...
  24. Replies
    4
    Views
    4,906

    The reason I want to find known vulnerabilities...

    The reason I want to find known vulnerabilities with the program is because I am a jr security analyst at a security consulting firm. We are doing an asessment for a client who uses this program and...
  25. Replies
    4
    Views
    4,906

    Netilla vulnerabilities

    Is anyone one aware of any vulnerabilities for the Netilla program? Not the Gnutella file sharing program but the alternative VPN solution. Any default passwords or any other known weaknesses would...
Results 1 to 25 of 26
Page 1 of 2 1 2