Search:

Type: Posts; User: rogueactivex; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    14
    Views
    19,371

    Are the tutorials you speak of on the main site...

    Are the tutorials you speak of on the main site or on the forum (via searching)? Also, while I recognize that most firewalls won't respond to most stealth scans, what about firewalking techniques...
  2. Replies
    14
    Views
    19,371

    There will be some sniffing in promiscuous mode....

    There will be some sniffing in promiscuous mode. However I was curious if there was a quick and easy way to scan for hosts on the network.

    It sounds like in your second paragraph you are...
  3. Replies
    14
    Views
    19,371

    Finding hosts on subnet using nmap.

    When I'm at a client's network sometimes I have the task of trying to find active hosts within the network. Lately I've been using the ping sweep command for NMAP and saving my results to a file,...
  4. Replies
    6
    Views
    7,713

    I have to be very vague on the details because it...

    I have to be very vague on the details because it relates to an ongoing case. I also don't have access to the original machine. However I could set up Windows 98 on VMWare and some different options....
  5. Replies
    6
    Views
    7,713

    Detecting data tampering; Win98

    What do you all think of this scenario?

    Let's suppose one has a laptop with a 10 gig hard drive. Let's further suppose that the OS is use is Windows 98. It becomes necessary to forensically...
Results 1 to 5 of 5