Type: Posts; User: Trench_Rot; Keyword(s):
Search took 0.01 seconds.
I didn't know exactly which forum to post this question. I thought this would be the most logical.
I am conducting a test of technical security controls for a client and I'm looking for the...
January 27th, 2006 08:55 PM
bballad, I think you're partially right in that you don't use the OSI verbatim, but I find that the concepts are priceless. It's the framwork of the OSI model and the ideas surrounding that I use...
January 27th, 2006 08:40 PM
I see you passed your Secure and Pix exams, so I'm assuming you've done your CCNA. This mean you have a basic understaning of TCP/IP, which is good. One of the best things you can do is now...
January 5th, 2006 02:08 PM
Haha, thanks for pointing that out. Like I said, I don't know much about programming.
Thank you for the quick tip and reference to your tutorial. I'm familiar with compiling open source...
January 5th, 2006 01:13 PM
I was wondering if anyone had or knew of any tutorials on compiling exploits (properly) in Linux. For example, I would like to experiment with the following exploit posted on FrSIRT.
November 22nd, 2005 05:08 PM
Nice pick Tiger... I'm using this too. Let me know if you have any questions about it. I've had it in production for months.
It's actually a really great tool. I would suggest anyone who has...
November 22nd, 2005 04:30 PM
Sorry, I should have mentioned this. The IDS solution is distributed over 30 sensors around the world. The SQL server are deployed this way too. Any given sensor will be handling...
November 22nd, 2005 03:04 PM
I have 128 MS SQL servers I need to add into my snort conf. I want to know if anyone has any info or experiences (good or bad) with this.
The servers cannot be added by subnet as they are...
November 8th, 2005 09:10 PM
I think Eyecre8 already suggested this, but check out your friend's system. This seems to be an important peice of the puzzle. So far it seems to be the only unchanged variable.
October 7th, 2005 07:11 PM
Yeah, I just ran a test with te : and it hits every in the range.
var TEST 20:1500
It triggered on 20, 1500, and everything in between :(
Hmm, I'm going to play around a little...
October 7th, 2005 05:56 PM
My understanding of the : is that it makes the "list" a range. So it I put 80:8080 it will look at all ports between 80 and 8080. Not just 80 and 8080 as a list.
Is this correct or am I...
October 7th, 2005 05:12 PM
After some experimenting I've realized that you cannot list ports for PORT variables in the snort.conf files. I actually just read in some Sourcefire documentation that if you list port with commas...
September 1st, 2005 01:54 AM
First the quick question:
Does anyone know what ports IBM Websphere Everyday Connection Manager runs on or which ones need to be opened on a firewall?
The long, boring...
There you go. But like kernal said, there are utilities out there to boot with that will let you access NTFS partitions and grab the SAM file.
And I wouldn't even break out LC5. The guy's...
As a workaround I would recommend encrypting the file before you move them to the USB disk. Use PGP or whatever flavor of encryption you like. It will protect the integrity and confidentiality of...
March 24th, 2005 02:33 PM
I'm testing Hydra against a router I know the username and passwordfor, but I'm getting flaky results. I'm trying to brute force the enable password, but I don't think my command line is quite...
January 21st, 2005 09:52 PM
If you could send to me or post any of that info your engineer documented that would be awesome. I would just like to see some of the problem you ran into. I also need to for some backup to my...
January 21st, 2005 07:49 PM
I'm working on a project that will allow me to schedule Nessus scans through a web interface. The only thing I've come across that will allow me to do this in an open source product called...
December 14th, 2004 04:29 PM
but doesn't ethereal have a gui set up and require pcap? Remember I'm on a windows box with strictly cmd line access.
If you know of a version of ethereal that meets these requirement can you...
December 14th, 2004 03:53 PM
I'm trying to do an internal pen test and here's my dilemma...
I compromise a (Windows) machine and have cmd line access. I want to start sniffing traffic coming from and to the machine. How do I...
October 18th, 2004 06:51 PM
I was wondering if some people who have used ettercap could tell me about their experiences.
My main questions are:
Does it work well and did it perform to what you expected?
Is there are...
October 13th, 2004 08:29 PM
Nevermind. I figured it out.
What a pain!
Here's the solution if you read this and needed an answer.
In secpol.msc under Security Options you must change the following:
October 13th, 2004 07:56 PM
Ok... I'm very familiar with the net use command and it's switches. I've been using it for years to manage W2k boxes. I've run into a problem, which is probably a simple one that one of you can...
October 5th, 2004 04:26 PM
I'd like to get the community's opinions on this story.
Link to FT.com story on North Korea
Mostly bad? No one's worried?
Regardless of whether this turns into an international problem...
September 23rd, 2004 07:42 PM
Got the tool and gave it a try. I detected the vulnerable .dll's. I have a question about one of them.