similar to: How to prevent IP-spoofing/traffic sniffing by the guest machines?

Displaying 20 results from an estimated 10000 matches similar to: "How to prevent IP-spoofing/traffic sniffing by the guest machines?"

2003 Sep 12
0
Q. on key sniffing/spoofing
Hi everyone, I'd like to set up the RSA keys for the IAX registration, but have a couple of Q's. I have the manual and can follow the instructions, but I want to understand the limitations. First, understand there will be a central Asterisk (which has the private key?) and several remote Asterisks (which are as automated as possible, and each have the same public key?). We
1999 Nov 27
1
Re: Programming ...
Many thanks to the moderator who pointed out errors and suggested the correct information on this post. Over half the ideas are due to him. ;) Don't forget this is about writing your own daemon or TCP program. Some of the ideas here will not happen with today's software that has been hardened. It is presented to prevent your software from being taken advantage of. Most often,
2008 Jan 31
2
Missing packets on Dom0 when sniffing bridge with wireshark/tethreal
Hi, I have a Centos5 machine running xen 3.0.3-41 with two NICs each on its own subnet: 192.168.1.x and 192.168.0.x. All DomUs can talk to each other OK through two xen bridges. There are 3 DomUs: Dom0, Dom1 and Dom2 The scenario: I''m trying to capture packets on Dom2 on 192.168.0.x from external devices that are sending SIP stuff to Dom1, but fail to capture any packets. I
2010 May 05
1
libvirtd loses all of its data after restart
Hi, I'm having a problem with libvirtd (backend being kvm) losing its if I restart it with /etc/init.d/libvirtd restart. What I did was: Start libvirtd Connect to it using virsh Create a new storage pool with pool-create-as Create some volumes with vol-create-as Create some virtual machines with create Restart libvirtd using /etc/init.d/libvirtd restart Reconnect with virsh After
1999 Nov 27
1
Re: Programming ...
From: Wade Maxfield <maxfield@ctelcom.net> > Many thanks to the moderator who pointed out errors and suggested the > correct information on this post. Over half the ideas are due to him. ;) > 1. Programs put data in local variables in functions. These variables > are on the computer stack. Feeding data to those variables (usually > string variables) causes the
2007 Jun 28
2
Caller ID Spoofing to be banned in the USA
Anyone running caller id spoofing applications in the USA running asterisk? Then it's time to move them to Canada or similar. http://arstechnica.com/news.ars/post/20070627-caller-id-spoofing-about-t o-be-outlawed.html Regards, Dean Collins Cognation Pty Ltd dean at cognation.net <mailto:dean at cognation.net> +1-212-203-4357 Ph +61-2-9016-5642 (Sydney in-dial).
2015 Feb 16
1
[Bridge] Sniffing a linux bridge vs sniffing enslaved interfaces
Hi all Assume that you have a linux bridge with two interfaces eth0 and eth1 enslaved to this bridge What is the difference between sniffing the bridge and sniffing its interfaces? tcpdump -i br0 vs tcpdump -i eth0 Thanks MiniME -------------- next part -------------- An HTML attachment was scrubbed... URL:
2015 Feb 16
2
[Bridge] Sniffing a linux bridge vs sniffing enslaved interfaces
I can think of several potential differences. ?You may miss any bridge specific traffic (STP, LLDP) using the interfaces generated by the bridge itself. If you have vlan tagged sub interfaces you might also miss that traffic if you were snooping a particular interface. Obviously you will miss any on-wire broadcast traffic specific to the layer1 connection a particular interface was connected to
2004 Jun 07
1
Network Sniffing Calls for recording
Ok assuming I don't want to record calls using * but instead want a dedicated server that listens to a mirror port and records calls. Is there a cheap software package out there for doing this for mgcp/sccp? I know if evern cut over to * there is a way but I doubt I will even cut 100% over to * so I was wonder what the list has heard of for call recording via sniffing my gates. I know there
2007 Feb 26
1
About ISP sniffing, trying to undertstand
Hello, I am trying to understand how Tor protect to ISP sniffing in proxy. I suppose this steps: 1) Dowload Tor software, software should signed or downloaded from SSL site. 2) Computer software verify that software is not modified, and install it. 3) Vidalia starts tunnel, At this point how keys are exchanged? ... -- -- Devel in Precio http://www.pas-world.com
2006 Feb 21
3
sniffing sip password/uri/host info
Hello all, I want to sniff all these info to test a sip ip phone talking to a asterisk server. I have used tcpdump, but It just shows the UDP, length: 602 Anyway to see the sip uri. Host info? Regards, Dinesh. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2014 Mar 22
2
[LLVMdev] LLVM memory management
I made a mistake in my previous email what I want to know about is the component called lli which is part of the LLVM compiler infrastructure. The command lli allow for programs compiled to bytecode to be run directly. 1. How does the lli keep itself from being overwritten by a misbehaving program? 3. does it support multithreading? 4. does lli allow for multitasking or do you just ran one VM
2009 Sep 12
1
OT: Question about Wifi sniffing on network
Most of you have needed at one time or another to sniff network traffic for trouble shooting purposes. Today I noticed that one of my SIP phone's web interface worked much faster with Opera, so I wanted to see what exactly was going on. I set up Wireshark and toook a look, but I got distracted by the fact that I saw a bunch of strange things coming from "FreeboxS_nn". I know my
2011 Jan 19
1
Getting CPU and memory usage statistics for the host
Hi, I have noticed that virt-manager has the ability to show me the current cpu- and memory-usage of both the host and running guest machines. How does it do that? I could make good use of that information myself in the client applications I'm writing, however, from what I can see on http://libvirt.org/html/libvirt-libvirt.html, I have no idea how to go about getting it from libvirt. In
2008 Feb 07
1
Filtering traffic to Xen guest machines
Hello. I''ve just started using Xen. My configuration is plain simple: I''ve got a Centos 5 Host with Xen and a single virtual machine which also uses Centos 5. Both of them have real IPs of the same real network. Now, I have to delegate the server administration to an external company which I don''t trust, so I''d want to filter any connection started by the
2007 Nov 23
12
[SECURITY] preventing Hwaddr spoofing on bridge
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Is there a way to prevent hwaddr/mac address spoofing between DomU''s? So in a way ''binding'' a mac-address on boot time with a virtual interface? (with something like ebtables/arptables/etc?) Stefan -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.7 (GNU/Linux) Comment: Using GnuPG with Mozilla -
2007 May 31
0
Custom CLI (spoofing) ?
I'm trying to have a go at CLI spoofing. My outbound calls may go out over various VoIP providers, using least cost routing to determine which provider for call destination and time of day. No matter which provider I go out over, i'd like the called party to only see only one of my numbers - that number will be the only number i'll want people to call back on. To test, i've
2011 Aug 25
1
security: SIP header spoofing CHANNEL(recvip)?
I am currently suffering various SIP attacks. I am using the following extension to record the caller's IP address: exten => h,n,set(CDR(srcip)=${CHANNEL(recvip)}) However, in recent attacks, this IP address is not correct, and I believe that they are spoofing it. I am using asterisk 1.6.2.15. Does the CHANNEL(recvip) variable record IP show in the SIP header instead of the real, UDP
2006 May 24
3
Spoofing a BLF Signal?
Is there anyway to "spoof" a BLF signal to a phone from within a dialplan? That being so I can turn a BLF light on or off on a phone when a certain thing happens in a dialplan?
2013 Nov 19
2
macvtap direct and ip spoofing
Hi there. I have configured kvm domain (rhel6.4) with ethernet bridged over macvtap, and found no filtration applied except mac. 'virsh' just silently ignoring attributes 'filterref' and 'ip address' in different formats. No error on validate stage. Config examples: ... <interface type='direct'> <mac address='52:54:00:31:ae:1a'/>