-
April 11th, 2004, 12:34 AM
#1
Senior Member
security test faild help
I probed my computer at grc.com and all my computer passed all the test except it siad true stealth test faild because it said
Solicited TCP Packets: RECEIVED (FAILED)
how can i increase my security ,and what are Solicited TCP Packets
-
April 11th, 2004, 01:21 AM
#2
are you trying to stealth your ports? Get a firewall which does that such as Norton's Personal Firewall. I think ZA does that too but its harder to use.
-
April 11th, 2004, 01:34 AM
#3
In essence ? what it means is that the computer has responded to the probe.
Wheras in stealth mode it would not.
I use NAV NetSec 2004, it comes up with a clean (stealthy) score sheet.
so now I'm in my SIXTIES FFS
WTAF, how did that happen, so no more alterations to the sig, it will remain as is now
Beware of Geeks bearing GIF's
come and waste the day :P at The Taz Zone
-
April 11th, 2004, 02:10 AM
#4
Did GRC.com specify a certain port?
NORML
Signature image is too tall!
-
April 11th, 2004, 04:37 AM
#5
Can you be a little more specific about which test failed? It's been forever since I used any of the testing there, but there is a "leak test" that is going to fail every time because you pretty much give it permission to allow the traffic it is testing for. (overly simplistic explanation, but basically not much to worry about)
Without specifics, it's a little difficult to determine what you are looking at. foxyloxey provides an adequate explanantion.
-
April 11th, 2004, 04:52 AM
#6
The gibson camp..........The guy who was attacked by a 13 year old aKa Wicked
http://www.chiark.greenend.org.uk/pi...ne/016358.html (The Boy Who Cried Wolf ) ( Henney Penny The Sky Is Falling)
http://grc.com/dos/grcdos.htm
[b]Quote[b]
Stealthing under many situations can actually give back _more_ information than just having the port closed, especially on server system. Stealthing is just another farce from the Steve Gibson camp. If you have a system that is listening on port 80 and stealthing everything else, the attacker obviously knows that a system exists there, and using timing attacks a sophistocated attack can even determine the type of firewall you are running as stealthing adds more latency than having the port just not being open. This latency may be calculated be using a carefully constructed request to any open services. Once this is accomplished, the attacker can make a good guess about the firewall based on this data.
catch
Source: http://www.antionline.com/showthread...tch+stealthing
-
April 11th, 2004, 01:02 PM
#7
Senior Member
i heard about him getting nuked by a 13 year old but i did'nt know if it was true.
i clicked on text summary and put it in note pad
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|