Displaying 20 results from an estimated 10000 matches similar to: "How to prevent IP-spoofing/traffic sniffing by the guest machines?"
2003 Sep 12
0
Q. on key sniffing/spoofing
Hi everyone,
I'd like to set up the RSA keys for the IAX registration, but have a
couple of Q's. I have the manual and can follow the instructions, but I
want to understand the limitations.
First, understand there will be a central Asterisk (which has the
private key?) and several remote Asterisks (which are as automated as
possible, and each have the same public key?). We
1999 Nov 27
1
Re: Programming ...
Many thanks to the moderator who pointed out errors and suggested the
correct information on this post. Over half the ideas are due to him. ;)
Don't forget this is about writing your own daemon or TCP program. Some
of the ideas here will not happen with today's software that has been
hardened. It is presented to prevent your software from being taken
advantage of.
Most often,
2008 Jan 31
2
Missing packets on Dom0 when sniffing bridge with wireshark/tethreal
Hi,
I have a Centos5 machine running xen 3.0.3-41 with two NICs each on its own
subnet: 192.168.1.x and 192.168.0.x. All DomUs can talk to each other OK
through two xen bridges. There are 3 DomUs: Dom0, Dom1 and Dom2
The scenario:
I''m trying to capture packets on Dom2 on 192.168.0.x from external devices
that are sending SIP stuff to Dom1, but fail to capture any packets. I
2010 May 05
1
libvirtd loses all of its data after restart
Hi,
I'm having a problem with libvirtd (backend being kvm) losing its if I restart
it with /etc/init.d/libvirtd restart.
What I did was:
Start libvirtd
Connect to it using virsh
Create a new storage pool with pool-create-as
Create some volumes with vol-create-as
Create some virtual machines with create
Restart libvirtd using /etc/init.d/libvirtd restart
Reconnect with virsh
After
1999 Nov 27
1
Re: Programming ...
From: Wade Maxfield <maxfield@ctelcom.net>
> Many thanks to the moderator who pointed out errors and suggested the
> correct information on this post. Over half the ideas are due to him. ;)
> 1. Programs put data in local variables in functions. These variables
> are on the computer stack. Feeding data to those variables (usually
> string variables) causes the
2007 Jun 28
2
Caller ID Spoofing to be banned in the USA
Anyone running caller id spoofing applications in the USA running
asterisk?
Then it's time to move them to Canada or similar.
http://arstechnica.com/news.ars/post/20070627-caller-id-spoofing-about-t
o-be-outlawed.html
Regards,
Dean Collins
Cognation Pty Ltd
dean at cognation.net
<mailto:dean at cognation.net> +1-212-203-4357 Ph
+61-2-9016-5642 (Sydney in-dial).
2015 Feb 16
1
[Bridge] Sniffing a linux bridge vs sniffing enslaved interfaces
Hi all
Assume that you have a linux bridge with two interfaces eth0 and eth1
enslaved to this bridge
What is the difference between sniffing the bridge and sniffing its
interfaces?
tcpdump -i br0 vs tcpdump -i eth0
Thanks
MiniME
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2015 Feb 16
2
[Bridge] Sniffing a linux bridge vs sniffing enslaved interfaces
I can think of several potential differences. ?You may miss any bridge
specific traffic (STP, LLDP) using the interfaces generated by the bridge
itself.
If you have vlan tagged sub interfaces you might also miss that traffic if
you were snooping a particular interface. Obviously you will miss any
on-wire broadcast traffic specific to the layer1 connection a particular
interface was connected to
2004 Jun 07
1
Network Sniffing Calls for recording
Ok assuming I don't want to record calls using * but instead want a
dedicated server that listens to a mirror port and records calls. Is there a
cheap software package out there for doing this for mgcp/sccp? I know if
evern cut over to * there is a way but I doubt I will even cut 100% over to
* so I was wonder what the list has heard of for call recording via sniffing
my gates. I know there
2007 Feb 26
1
About ISP sniffing, trying to undertstand
Hello,
I am trying to understand how Tor protect to ISP sniffing in proxy.
I suppose this steps:
1) Dowload Tor software, software should signed or downloaded from SSL
site.
2) Computer software verify that software is not modified, and install
it.
3) Vidalia starts tunnel, At this point how keys are exchanged?
...
--
--
Devel in Precio http://www.pas-world.com
2006 Feb 21
3
sniffing sip password/uri/host info
Hello all,
I want to sniff all these info to test a sip ip phone talking to a asterisk
server. I have used tcpdump, but It just shows the
UDP, length: 602
Anyway to see the sip uri. Host info?
Regards,
Dinesh.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2014 Mar 22
2
[LLVMdev] LLVM memory management
I made a mistake in my previous email what I want to know about is the
component called lli which is part of the LLVM compiler infrastructure. The
command lli allow for programs compiled to bytecode to be run directly.
1. How does the lli keep itself from being overwritten by a misbehaving
program?
3. does it support multithreading?
4. does lli allow for multitasking or do you just ran one VM
2009 Sep 12
1
OT: Question about Wifi sniffing on network
Most of you have needed at one time or another to sniff network
traffic for trouble shooting purposes.
Today I noticed that one of my SIP phone's web interface worked much
faster with Opera, so I wanted to see what exactly was going on. I set
up Wireshark and toook a look, but I got distracted by the fact that I
saw a bunch of strange things coming from "FreeboxS_nn". I know my
2011 Jan 19
1
Getting CPU and memory usage statistics for the host
Hi,
I have noticed that virt-manager has the ability to show me the current cpu- and
memory-usage of both the host and running guest machines.
How does it do that?
I could make good use of that information myself in the client applications I'm
writing, however, from what I can see on
http://libvirt.org/html/libvirt-libvirt.html, I have no idea how to go about
getting it from libvirt. In
2008 Feb 07
1
Filtering traffic to Xen guest machines
Hello.
I''ve just started using Xen. My configuration is plain simple: I''ve got a
Centos 5 Host with Xen and a single virtual machine which also uses Centos 5.
Both of them have real IPs of the same real network.
Now, I have to delegate the server administration to an external company which
I don''t trust, so I''d want to filter any connection started by the
2007 Nov 23
12
[SECURITY] preventing Hwaddr spoofing on bridge
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Is there a way to prevent hwaddr/mac address spoofing between DomU''s?
So in a way ''binding'' a mac-address on boot time with a virtual
interface? (with something like ebtables/arptables/etc?)
Stefan
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.7 (GNU/Linux)
Comment: Using GnuPG with Mozilla -
2007 May 31
0
Custom CLI (spoofing) ?
I'm trying to have a go at CLI spoofing.
My outbound calls may go out over various VoIP providers, using least cost routing to determine which provider for call destination and time of day.
No matter which provider I go out over, i'd like the called party to only see only one of my numbers - that number will be the only number i'll want people to call back on.
To test, i've
2011 Aug 25
1
security: SIP header spoofing CHANNEL(recvip)?
I am currently suffering various SIP attacks. I am using the following
extension to record the caller's IP address:
exten => h,n,set(CDR(srcip)=${CHANNEL(recvip)})
However, in recent attacks, this IP address is not correct, and I
believe that they are spoofing it. I am using asterisk 1.6.2.15.
Does the CHANNEL(recvip) variable record IP show in the SIP header
instead of the real, UDP
2006 May 24
3
Spoofing a BLF Signal?
Is there anyway to "spoof" a BLF signal to a phone from within a
dialplan? That being so I can turn a BLF light on or off on a phone
when a certain thing happens in a dialplan?
2013 Nov 19
2
macvtap direct and ip spoofing
Hi there. I have configured kvm domain (rhel6.4) with ethernet bridged over
macvtap, and found no filtration applied except mac. 'virsh' just silently
ignoring attributes 'filterref' and 'ip address' in different formats. No
error on validate stage. Config examples:
...
<interface type='direct'>
<mac address='52:54:00:31:ae:1a'/>