Search:

Type: Posts; User: slackwarelinux; Keyword(s):

Search: Search took 0.03 seconds.

  1. Apache chunked (gobbles) exploit on OpenBSD 3.1

    Hey guys, just a simple question for you all. I just recently installed OpenBSD 3.1
    on my home network. I obtained the apache chunked encoding vulnerability aka gobbles
    from packetstorm and ran it...
  2. Replies
    2
    Views
    4,067

    linux IP Masquerading Question

    Hey guys, ive got a question for yall.

    I have a small home network, a Slackware Linux machine which is a router, firewall etc.
    I have IP Masquerading setup correctly and my internal machines can...
  3. Replies
    4
    Views
    5,336

    I lookin into the CISSP cert, only to find out...

    I lookin into the CISSP cert, only to find out that just to TAKE the exam, you need 3+ years of security experience, kinda hard when your just starting out.

    Im going to take the SANS Information...
  4. Replies
    17
    Views
    13,335

    kinda sounds like your ppp0 interface is already...

    kinda sounds like your ppp0 interface is already in permiscous mode, hence you cant put it in permiscous mode if its already running in that manner.

    Also your synthax is a little screwey. It...
  5. Replies
    11
    Views
    10,648

    RE:

    Yeah, everyone is right here. If you can get away with it, dont place the two on the same host. What happins if your host goes down? your firewall and your IDS are gone, also
    what happines of...
  6. Replies
    8
    Views
    9,390

    just bought "Hackers Challenge"

    Hey guys, I recently picked up a copy of "Hackers Challenge - Test your incident response skilsl using 20 real life senarios". Its an absolutely fablous book and I recommend it to anyone whos...
  7. IIS/5.0 Attacked my Host - Sent email to admin

    hey guys, just wondering if this was ok to send to an admin in Thailand whos IIS/5.0
    system tried to attack my Apache 1.3.26 box (the banner was hacked to say Microsoft IIS/5.0) heheeh
    naughty...
  8. actually the ip address of my machine have been...

    actually the ip address of my machine have been sanitized, perhaps to avoid confusion next time
    i'll just xxx.xxx.xxx.xxx instead :)

    you asked about the placement of my IDS, well its stitting on...
  9. bash script for md5 binary integrity check

    Hey guys, just though id post this very, very simple bash script that will
    verify the md5 signatures of most of the important binarys on your linux systems (such as
    /bin, /sbin, /usr/bin,...
  10. Replies
    0
    Views
    6,050

    Libsafe 2.0.14 !!!BUG ALERT!!!

    Just a note for anyone who uses avayalabs libsafe version 2.0.16 (current).


    Heres a little background information on libsafe and why you should implement it


    "The exploitation of buffer...
  11. Replies
    6
    Views
    9,781

    chattr +i /etc/shadow can be good

    Just a note, if you change the attributes on /etc/shadow to immutable "chattr +i /etc/shadow"
    its not necessarly a bad thing.

    If your host is a garden variety web server or router for example,...
  12. Replies
    8
    Views
    8,730

    Yes, these logs have been "sanitized" for my and...

    Yes, these logs have been "sanitized" for my and everyone elses protection.

    Our network is doing IP Masquerading and our firewalls would block and log any "log martians", "source routed" or any...
  13. Replies
    8
    Views
    8,730

    ssh from SRC port 22 to DST port 22??

    Hey guys, im new here and this is my first post. Ive got a question about Secure Shell.
    Today at work snort allerted us to the following

    -- snort snort --

    [**] spp_stream4: STEALTH ACTIVITY...
  14. ssh from SOURCE PORT 22 to dest port 22?

    Hey guys, im new here and this is my first post. Ive got a question about Secure Shell.
    Today at work snort allerted us to the following

    -- snort snort --

    [**] spp_stream4: STEALTH ACTIVITY...
Results 1 to 14 of 14