Search:

Type: Posts; User: extremez; Keyword(s):

Page 1 of 3 1 2 3

Search: Search took 0.17 seconds.

  1. Replies
    32
    Views
    17,074

    If the pizza boy has access to that kinda...

    If the pizza boy has access to that kinda information so does everyone else which means identity theft would skyrocket. But I"m sure the government would love to have a system for themselves like...
  2. Thread: Bypassing NAT

    by extremez
    Replies
    17
    Views
    12,006

    I think tomdaq nailed it. I"m assuming that there...

    I think tomdaq nailed it. I"m assuming that there using NAT overloading here, when they may very well have a large public IP pool dynamically assigned(this would explain why I occassionally can't get...
  3. Thread: Bypassing NAT

    by extremez
    Replies
    17
    Views
    12,006

    It would assign it to the public IP(gateway), so...

    It would assign it to the public IP(gateway), so unless you had access to it and could forward it on to your private one, you'd be out of luck.
  4. Thread: Big Bucks!

    by extremez
    Replies
    11
    Views
    7,979

    I agree, these figures are pure BS, companies...

    I agree, these figures are pure BS, companies don't bother/scrimp with security maintenance they should be doing, then they get screwed and chock expenses up to viruses/worms. They make their budget...
  5. Sounds like you have a more basic network...

    Sounds like you have a more basic network problem, forget about domains vs workgroups for the time being.

    A vlan is a logical division of a switch(es) into separate segments, which means you...
  6. Thread: Bypassing NAT

    by extremez
    Replies
    17
    Views
    12,006

    Re: re: original bypass question

    By the fact that several spam net send messages have made it through I doubt there useing much stateful firewall filtering if any. Perhaps these connections are being made through a sort of...
  7. Thread: Bypassing NAT

    by extremez
    Replies
    17
    Views
    12,006

    I fully understand how the various methods of...

    I fully understand how the various methods of NATing work, I was wondering how NAT was bypassed, it seems from what your saying this is rather unusual situation.

    To clarify: I'm not being NATed by...
  8. Thread: Bypassing NAT

    by extremez
    Replies
    17
    Views
    12,006

    FWIN,2004/02/14,21:03:48 -5:00...

    FWIN,2004/02/14,21:03:48 -5:00 GMT,209.x.0.70:2785,10.x.4.254:3127,TCP (flags:S)
    FWIN,2004/02/14,21:03:56 -5:00 GMT,209.x.0.70:x52,10.x.4.254:31x,TCP (flags:S)
    FWIN,2004/02/14,21:04:04 -5:00...
  9. Replies
    7
    Views
    5,442

    I agree if this is your first software firewall...

    I agree if this is your first software firewall relax a little, your ip is being scanned, probed and knocked on constantly, and firewalls try to block everything to be safe, so a lot of what you see...
  10. Thread: Bypassing NAT

    by extremez
    Replies
    17
    Views
    12,006

    Bypassing NAT

    I've been wondering for awhile now about how people get passed NAT. I've noticed that even behind a NAT router, with no port forwarding, my software firewall still picks up a lot of attempted scans,...
  11. Replies
    9
    Views
    6,115

    Re: source port scanning through router

    Have you installed winpcap?
  12. Replies
    6
    Views
    10,700

    What message do you get when you try to log on...

    What message do you get when you try to log on with a blank password? Try setting a password then logging in. What error messages do you get?

    If your interested in the account explore. I don't...
  13. Replies
    13
    Views
    8,625

    Not really. THe first part was referring to...

    Not really. THe first part was referring to using own address e.g. 172.16.2 instead of the loopback 127.0.0.1 in local pen testing which you didn't mention, and the second part was elaborating on...
  14. Replies
    6
    Views
    10,700

    I haven't played with the hidden accounts in xp...

    I haven't played with the hidden accounts in xp yet, but try resetting the password on the command line, you should be able to login then.
  15. Replies
    13
    Views
    8,625

    In tcp/ip loopback is a separate entity from your...

    In tcp/ip loopback is a separate entity from your actual IP address, try connecting to your actual address instead of the loopback as its slightly more realistic simulation of a remote attack. You...
  16. Replies
    40
    Views
    19,459

    It's called TCP/IP Illustrated The Protocols. ...

    It's called TCP/IP Illustrated The Protocols.


    I think stuff on methodology and tactics - Internet firewalls - defending against Ip spoofing - DOS attacks would be very worthwhile, don't get...
  17. Replies
    7
    Views
    5,769

    Actually that's not true, you can sniff a high...

    Actually that's not true, you can sniff a high end, say cisco switch, if it doesn't have vlans defined, by continually corrupting/resetting the mac table, which causes it to broadcast all packets out...
  18. Replies
    3
    Views
    3,882

    Binary transfer!! Thankyou tedob! I knew I...

    Binary transfer!!

    Thankyou tedob!

    I knew I was missing something simple, I've been forgetting to use the binary transfer option.

    Greenies for you.
  19. Replies
    3
    Views
    3,882

    I disagree with you here, I've used tftp...

    I disagree with you here, I've used tftp succesfully in other situations before, I know its mainly used for uploading configs/updates to routers/switches but I've seen many examples of using it as a...
  20. Replies
    23
    Views
    11,301

    Often when an AV says it can't clean means the...

    Often when an AV says it can't clean means the whole file is a virus, thus there is nothing to clean, as long as the executable isn't running should be able to manually delete, however I agree, with...
  21. Replies
    3
    Views
    3,882

    Problems with TFTP

    I'm experimenting with some tools, and having problems with tftp.

    To be precise I'm accessing a cmd shell piped through NC being hosted on a win2000 box(1) be accessed by a another win2000 box(2)...
  22. Replies
    7
    Views
    5,917

    You should be doing regular virus/malware scans,...

    You should be doing regular virus/malware scans, but don't be too worried about frequent trojan scans, basically what skiddies will do is take a trojan's port and scan millions of addresses trying to...
  23. Replies
    20
    Views
    12,146

    Exactly, No prob ;)

    Exactly, No prob ;)
  24. Replies
    20
    Views
    12,146

    That would hamper relations. I thought you...

    That would hamper relations.

    I thought you said your firewall was blocking all attempts? Are they making it through to your DMZ??
  25. Replies
    20
    Views
    12,146

    Can you determine if this is probing or more of a...

    Can you determine if this is probing or more of a DOS attack, where the attacker tries to open up tons of dud connections, or get the server stuck in a localhost-loop? With a spoofed ip connection...
Results 1 to 25 of 68
Page 1 of 3 1 2 3