Search:

Type: Posts; User: sn0rf; Keyword(s):

Search: Search took 0.04 seconds.

  1. Replies
    11
    Views
    19,801

    Although it sounds interesting, it's too far from...

    Although it sounds interesting, it's too far from the truth :) and at least is far more outdated.
  2. Replies
    18
    Views
    20,594

    Before you do any investigation, I suggest to...

    Before you do any investigation, I suggest to boot from a rescue CD-ROM image, then mount the linux partition. It's possible that many commands, like find etc. have beend trojanized by the intruder.
  3. Replies
    29
    Views
    17,001

    Folks, the smart way to circumvent such a problem...

    Folks, the smart way to circumvent such a problem is to implement strong authentication by means of VPN. It's really secure and productive mechanism. ;)
  4. Replies
    29
    Views
    17,001

    I've implemented such a solution for more than 2...

    I've implemented such a solution for more than 2 years in a university. It's based on VPN (PPTP) channels, managed by a Win2000 NAS and authenticated by a RADIUS/SQL server. The whole system runs...
  5. Replies
    33
    Views
    33,877

    Re: Thanks

    Sure ;)

    And there's even more. Try to learn using tools like hping2 - you'll find some features to trace even behind some firewalls.
  6. Replies
    33
    Views
    33,877

    It depends on the type of firewall,...

    It depends on the type of firewall, configuration, intruder's skills etc.
    For example, it's possible to enumerate host behind a simple (non-stateful) firewall with ACK tcp packets using tools like...
Results 1 to 6 of 6