Search:
Type: Posts; User: extremez; Keyword(s):
Search:
Search took 0.17 seconds.
-
March 3rd, 2004, 10:09 PM
If the pizza boy has access to that kinda information so does everyone else which means identity theft would skyrocket. But I"m sure the government would love to have a system for themselves like...
-
March 3rd, 2004, 07:01 PM
I think tomdaq nailed it. I"m assuming that there using NAT overloading here, when they may very well have a large public IP pool dynamically assigned(this would explain why I occassionally can't get...
-
March 2nd, 2004, 07:32 PM
It would assign it to the public IP(gateway), so unless you had access to it and could forward it on to your private one, you'd be out of luck.
-
March 2nd, 2004, 07:17 PM
I agree, these figures are pure BS, companies don't bother/scrimp with security maintenance they should be doing, then they get screwed and chock expenses up to viruses/worms. They make their budget...
-
March 1st, 2004, 08:05 PM
Sounds like you have a more basic network problem, forget about domains vs workgroups for the time being.
A vlan is a logical division of a switch(es) into separate segments, which means you...
-
March 1st, 2004, 07:56 PM
By the fact that several spam net send messages have made it through I doubt there useing much stateful firewall filtering if any. Perhaps these connections are being made through a sort of...
-
March 1st, 2004, 01:06 AM
I fully understand how the various methods of NATing work, I was wondering how NAT was bypassed, it seems from what your saying this is rather unusual situation.
To clarify: I'm not being NATed by...
-
February 28th, 2004, 05:25 PM
FWIN,2004/02/14,21:03:48 -5:00 GMT,209.x.0.70:2785,10.x.4.254:3127,TCP (flags:S)
FWIN,2004/02/14,21:03:56 -5:00 GMT,209.x.0.70:x52,10.x.4.254:31x,TCP (flags:S)
FWIN,2004/02/14,21:04:04 -5:00...
-
February 28th, 2004, 03:46 PM
I agree if this is your first software firewall relax a little, your ip is being scanned, probed and knocked on constantly, and firewalls try to block everything to be safe, so a lot of what you see...
-
February 28th, 2004, 03:36 PM
I've been wondering for awhile now about how people get passed NAT. I've noticed that even behind a NAT router, with no port forwarding, my software firewall still picks up a lot of attempted scans,...
-
February 28th, 2004, 03:30 PM
Have you installed winpcap?
-
January 28th, 2004, 10:47 PM
What message do you get when you try to log on with a blank password? Try setting a password then logging in. What error messages do you get?
If your interested in the account explore. I don't...
-
January 28th, 2004, 05:27 PM
Not really. THe first part was referring to using own address e.g. 172.16.2 instead of the loopback 127.0.0.1 in local pen testing which you didn't mention, and the second part was elaborating on...
-
January 28th, 2004, 05:21 PM
I haven't played with the hidden accounts in xp yet, but try resetting the password on the command line, you should be able to login then.
-
January 28th, 2004, 05:03 PM
In tcp/ip loopback is a separate entity from your actual IP address, try connecting to your actual address instead of the loopback as its slightly more realistic simulation of a remote attack. You...
-
January 28th, 2004, 04:32 PM
It's called TCP/IP Illustrated The Protocols.
I think stuff on methodology and tactics - Internet firewalls - defending against Ip spoofing - DOS attacks would be very worthwhile, don't get...
-
January 23rd, 2004, 04:08 PM
Actually that's not true, you can sniff a high end, say cisco switch, if it doesn't have vlans defined, by continually corrupting/resetting the mac table, which causes it to broadcast all packets out...
-
January 22nd, 2004, 10:52 PM
Binary transfer!!
Thankyou tedob!
I knew I was missing something simple, I've been forgetting to use the binary transfer option.
Greenies for you.
-
January 22nd, 2004, 10:28 PM
I disagree with you here, I've used tftp succesfully in other situations before, I know its mainly used for uploading configs/updates to routers/switches but I've seen many examples of using it as a...
-
January 22nd, 2004, 10:22 PM
Often when an AV says it can't clean means the whole file is a virus, thus there is nothing to clean, as long as the executable isn't running should be able to manually delete, however I agree, with...
-
January 22nd, 2004, 09:30 PM
I'm experimenting with some tools, and having problems with tftp.
To be precise I'm accessing a cmd shell piped through NC being hosted on a win2000 box(1) be accessed by a another win2000 box(2)...
-
January 20th, 2004, 09:14 PM
You should be doing regular virus/malware scans, but don't be too worried about frequent trojan scans, basically what skiddies will do is take a trojan's port and scan millions of addresses trying to...
-
January 20th, 2004, 06:20 PM
-
January 20th, 2004, 05:36 PM
That would hamper relations.
I thought you said your firewall was blocking all attempts? Are they making it through to your DMZ??
-
January 20th, 2004, 05:24 PM
Can you determine if this is probing or more of a DOS attack, where the attacker tries to open up tons of dud connections, or get the server stuck in a localhost-loop? With a spoofed ip connection...
|
|