Page 2 of 2 FirstFirst 12
Results 11 to 20 of 20

Thread: TTL and traceroute: The forgotten hack.

  1. #11
    Senior Member
    Join Date
    Jun 2003
    Posts
    772
    I cannot be held responsible for the lack of intelligence in the following sentence.

    chsh is a ****tard.
    The above sentences are produced by the propaganda and indoctrination of people manipulating my mind since 1987, hence, I cannot be held responsible for this post\'s content - me

    www.elhalf.com

  2. #12
    Ninja Code Monkey
    Join Date
    Nov 2001
    Location
    Washington State
    Posts
    1,027
    Now, I have no real interest in the flaming between chsh and tiger shark. But there is no way that a post such as el-half's deserves ap's of the green variety. It posted no useful content and just continued the flame war. People often bitch that most of this board is a popularity contest....thank you for proving them right.

    I'd suggest if you're (you meaning anyone who reads this) gonna respond with anything negative in the future at least provide some relevant information to back you up. Flaming for flaming's sake is stupid, at least in a forum where people are trying to get useful information.
    "When I get a little money I buy books; and if any is left I buy food and clothes." - Erasmus
    "There is no programming language, no matter how structured, that will prevent programmers from writing bad programs." - L. Flon
    "Mischief my ass, you are an unethical moron." - chsh
    Blog of X

  3. #13
    Senior Member z31200n3's Avatar
    Join Date
    Jan 2004
    Location
    Bellevegas
    Posts
    102
    Ts, great information. Ive been reading a bit lately about TTL and TCP/IP and your summary really helped it make more sense.

  4. #14
    Senior Member
    Join Date
    Oct 2002
    Posts
    4,055
    Tiger Shark: Great tutorial, useful information (in my eye's) and an interesting topic for people who deal with Networking as well as Information Security (such as myself ). Greenies for you my friend.
    Space For Rent.. =]

  5. #15
    They call me the Hunted foxyloxley's Avatar
    Join Date
    Nov 2003
    Location
    3rd Rock from Sun
    Posts
    2,534
    Oh bloody hell.......
    I'm still reading last nights epistle.
    I'm calling nihil to stop him giving you whatever it is that keeps HIM up ( OOh Errr)

    I did a crash course in IT, and they covered TCP/IP pretty good for the time allowed,
    and then I read this.

    Dear Tiger: please restrain yourself to one a week please, as the old eyes don't work quite as well as they used to.
    so now I'm in my SIXTIES FFS
    WTAF, how did that happen, so no more alterations to the sig, it will remain as is now

    Beware of Geeks bearing GIF's
    come and waste the day :P at The Taz Zone

  6. #16
    Senior Member
    Join Date
    Nov 2001
    Posts
    1,255
    Originally posted here by Negative
    Neggy impatiently waits for chsh's impressive, related-to-this-forum, over-our-head tutorials...
    Gotta love the hypocrisy.

    Originally posted here by phishphreek80
    Do you ever have anything nice to say?
    Plenty.

    It seems that you always spend more time trying to find something wrong with a thread/post than you do adding something of value to a thread/post.
    I was giving Tiger Shark kudos.

    But hey, we're all entitiled to our opinions...
    Indeed.

    Originally posted by Tiger Shark
    Hmmm.... "TCP Flags: Their use and abuse" explained what the typical flags are for and how, with knowledge of the information returned can be, in part, used to footprint a system or in some cases deny it service.
    Actually, it was a somewhat inaccurate half-effort at best. You sort of mention things can be done without explaining how, nor do you explain the differences between implementations. That is neither here nor there, the point is it's not really security related.

    "TTL and traceroute: The forgotten hack"..... Let's see, traceroute is an implementation, if you will, of the TTL in an IP packet that began life as a hack. It explains how and why it works and goes on to hint at the fact that the principle can be used to enumerate resources beind a firewall that doesn't allow ICMP Echo_Requests through to the internal devices but might allow ICMP Time_Exceeded packets out.
    Enumeration is not hacking. At any rate, you are admitting here it is an implementation specific issue.

    Both are undoubtedly security related. Maybe you don't understand the difference between "Security" and "Other".
    Neither tutorial discusses in any way how to improve the security of your systems. You discussed nothing in this tutorial of how to defeat such "hacks" (which are really just simplistic enumeration). IMO the line between security and other in this instance has something to do with whether there is any discussion on how to improve the security of your computer. This discusses nothing related to that, and therefore belongs in other IMO.

    While you are here I'll give you a little update from the last thread you tried to screw up with your pathetic "I'm so bloody superior" attitude. Faqt has progressed rather well in her quest. She has quite thoroughly enumerated the applicable resources on her network and has already received half her extra credits for managing to do so. Her midterms got a little in the way but I understand she is working again on the issue. She has done this all on her own with only conceptual suggestions and encouragement from me, (and maybe others), through PM's so as to avoid your unconstructive drivel.
    Funny thing, Faqt wrote me directly via pm and cleared up the matter. This is irrelevant to the issue at hand.
    Chris Shepherd
    The Nelson-Shepherd cutoff: The point at which you realise someone is an idiot while trying to help them.
    \"Well as far as the spelling, I speak fluently both your native languages. Do you even can try spell mine ?\" -- Failed Insult
    Is your whole family retarded, or did they just catch it from you?

  7. #17
    Senior Member
    Join Date
    Feb 2004
    Posts
    620
    Wow, and I thought TheSpecialist was an ass.

  8. #18
    Senior Member
    Join Date
    Jun 2003
    Posts
    772
    I'd suggest if you're (you meaning anyone who reads this) gonna respond with anything negative in the future at least provide some relevant information to back you up. Flaming for flaming's sake is stupid, at least in a forum where people are trying to get useful information.
    It is obvious my post was lame, but chsh's comment on Tiger Shark's article was exactly the same, only stated more fancy.
    The above sentences are produced by the propaganda and indoctrination of people manipulating my mind since 1987, hence, I cannot be held responsible for this post\'s content - me

    www.elhalf.com

  9. #19
    Ninja Code Monkey
    Join Date
    Nov 2001
    Location
    Washington State
    Posts
    1,027
    The part of my post that you quoted was just as much for chsh as it was for you, mjk, and anyone else. It would appear that chsh has at least read it since his next post has more information to back up his opinions on the matter.
    "When I get a little money I buy books; and if any is left I buy food and clothes." - Erasmus
    "There is no programming language, no matter how structured, that will prevent programmers from writing bad programs." - L. Flon
    "Mischief my ass, you are an unethical moron." - chsh
    Blog of X

  10. #20
    Senior Member
    Join Date
    Nov 2001
    Posts
    4,785
    TS. i gotta say i really enjoy your writing style. you bring clarity to whatever it is your writing about. more! more!
    Bukhari:V3B48N826 “The Prophet said, ‘Isn’t the witness of a woman equal to half of that of a man?’ The women said, ‘Yes.’ He said, ‘This is because of the deficiency of a woman’s mind.’”

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •