April 3rd, 2004, 09:03 PM
Although it sounds interesting, it's too far from the truth :) and at least is far more outdated.
February 27th, 2004, 10:38 AM
Before you do any investigation, I suggest to boot from a rescue CD-ROM image, then mount the linux partition. It's possible that many commands, like find etc. have beend trojanized by the intruder.
December 30th, 2003, 11:20 PM
Folks, the smart way to circumvent such a problem is to implement strong authentication by means of VPN. It's really secure and productive mechanism. ;)
December 28th, 2003, 10:44 PM
I've implemented such a solution for more than 2 years in a university. It's based on VPN (PPTP) channels, managed by a Win2000 NAS and authenticated by a RADIUS/SQL server. The whole system runs...
December 28th, 2003, 09:28 PM
Sure ;)
And there's even more. Try to learn using tools like hping2 - you'll find some features to trace even behind some firewalls.
December 28th, 2003, 03:12 PM
It depends on the type of firewall, configuration, intruder's skills etc.
For example, it's possible to enumerate host behind a simple (non-stateful) firewall with ACK tcp packets using tools like...