Displaying 20 results from an estimated 4000 matches similar to: "unwanted oper login"
2005 May 04
6
Segmenting wireless traffic
I''m considering adding a seperate subnet to my loc network making loc1
(192.168.1.0/24) and loc2 (192.168.0.1/24) with the goal of seperating
my wireless traffic from my wired LAN traffic.
Has anyone had success doing this, or is it still possible to sniff the
traffic of a seperate zone on the same interface with tools like ettercap?
2009 Jun 29
4
how to sniff RTP and SIP traffic only
Hi, do somebody knows how to sniff RTP and SIP traffic only for a faster
debugging ?
Thanks.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20090629/5e160c92/attachment.htm
2005 Jul 04
2
compromising security
Recently, I was thinking if my setup is secure.
When the workstations start, they also start a script, which connects to
a Samba share with username/password (and there is software in this
share, with the registration keys etc. important data).
On a workstation, this script can't be read by a normal user (I was
considering some sort of simple pseudo-encrypting, which would turn
plaintext
2015 Feb 16
2
[Bridge] Sniffing a linux bridge vs sniffing enslaved interfaces
I can think of several potential differences. ?You may miss any bridge
specific traffic (STP, LLDP) using the interfaces generated by the bridge
itself.
If you have vlan tagged sub interfaces you might also miss that traffic if
you were snooping a particular interface. Obviously you will miss any
on-wire broadcast traffic specific to the layer1 connection a particular
interface was connected to
2009 Dec 04
2
two questions about ssh tunneling
if I:
ssh -fND localhost:6000 somebody at 192.168.56.5 -p PORTNUMBER
from computer "A" to computer "B" [B = 192.168.56.5] then I can set the
SOCKS proxy for e.g.: Firefox to use "localhost:6000" on computer "A".
Ok. I can surf the web through "B".
But:
- Can anyone sniff the traffic of "A"? [e.g.: computers on same subnet
as
2004 Aug 06
2
a new directory service
> Hopefully.. considering their DSP guy and a handful of others were laid
> off.. the new DSP they have really blows too so I'm forced into using the
> old one.. oh well.
The ogg plugin author was not an employee. He was a contractor. He's
still working on the plugin regardless.
> Oh that's cool.. and I assume the WMP plugin is available through the wacky
> MS
2003 Dec 01
7
Three way ICMP ?
I''m getting 2 or three of these a day...Any ideas ?
The 192.168.250.zz is a eth0:3 on a box that currently only has eth0:1
active
Dec 1 15:47:40 machine-name kernel: Shorewall:all2all:REJECT:IN= OUT=eth0
SRC=my.real.ip.addr DST=66.228.216.22 LEN=68 TOS=0x00 PREC=0xC0 TTL=255
ID=12031 PROTO=ICMP TYPE=3 CODE=1 [SRC=66.228.216.22 DST=192.168.250.zz
LEN=40 TOS=0x00 PREC=0x00 TTL=46
2004 Apr 20
10
TCP RST attack
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
----Quote----
"The impact of this vulnerability varies by vendor and application, but in
some deployment scenarios it is rated critical. Please see the vendor
section below for further information. Alternatively contact your vendor
for product specific information.
If exploited, the vulnerability could allow an attacker to create a
2007 Apr 18
1
[Bridge] Strange DHCP behaviour with bridging
Here is the scenario: I have one server with kernel 2.4.24 with a bridge br0
made of 2 interfaces, eth0 and tap0 (the last is an OpenVPN tunnel), and one
remote computer connetting through tap0. If I assign a static IP to the
remote computer, the bridge works perfecly (so I think the problem is not
OpenVPN-related). If I start a DHCPd on the server and I configure the remote
client to get the
2007 Apr 18
2
[Bridge] Bridge firewall
Hi,
I'm relatively new to linux world.I'm just trying to setup a bridge firewall
between a router and LAN.
I've installed Red Hat Linux 9.0 - 2.4.20-8 from installation CDs and
upgraded to 2.4.25 successfully.
I've patched my kernel to support bridge firewall also loaded ebtables
module,so far so good.Now I tried to create a bridge using the code given in
the following link
1998 May 23
7
Re: Re: Re: Bind Overrun Bug and Linux (fwd)
> > systems which no longer seem to have this. This file contained an archive of
> > the trojan''s that were inserted into the compromised system - does anybody know
> > what is in these trojans?
>
> Check the Linux RootKit ... (LRK)..
>
> Typically LRK to use config-files.. (and typically LRK-users to place
> files in /dev.. find /dev -type f | grep -v
2006 Feb 21
3
sniffing sip password/uri/host info
Hello all,
I want to sniff all these info to test a sip ip phone talking to a asterisk
server. I have used tcpdump, but It just shows the
UDP, length: 602
Anyway to see the sip uri. Host info?
Regards,
Dinesh.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2008 Jan 17
7
Netfilter, libpcap, ntop and promiscuous mode?
I have a really basic question (I think). We have two boxes connected
to a lan segment on a hub. One is a Windows box running "Show Traffic",
the other is a CentOS 5 Linux box running "ntop". Both boxes should be
able to sniff all of the traffic on that hub (not a switch).
The Windows box does just fine, Show Traffic is able to display traffic
destined for other boxes
2010 Dec 20
16
Network isolation - PCI passthrough question
Hello,
I thinking about using PCI passthrough to dedicated a domU as firewall.
I understand PCI passthrough concept. When done, my domU will see
network card and the dom0 won''t any more. So I''ll be able to filter all
trafic from outside, since it will go through network domU.
Then, how will I be able to connect other domU (and maybe dom0) to the
network domU ?
In a normal way,
2016 Feb 03
2
Samba on Win7?
In an environment with Win7 Embedded server and client where UNC pathnames
are used to pull files, can Samba >= 3 be used on both sides (and Windows'
own SMB disabled) so that communications can be encrypted?
(We can't use IPsec, and it doesn't look like SMB 3.0 will be coming to
Win7. Next thought was Samba. If not that, then I guess I'll look into a
VPN.)
2006 Sep 08
4
URL authentication
I had similar problems when my auth.php was on password protected http
server...but after applying the following configuration i've got it working:
<mount>
<mount-name>/Test</mount-name>
<authentication type="url">
<option name="listener_add"
value="http://user:pass@127.0.0.1/auth/action.php"/>
<option
2009 Jun 21
6
Program to ban sniffers
So I have been reading the ssh attack thread and finally want to ask about
something.
I doubt there is a program like this, but I would love to have a program
that listens at common ports that I do not use at all...and only allow that
program to listen to it, especially the usual ssh port (using a different
one for real ssh)...
That program would then, upon receiving a 'sniff' or
2001 Jun 02
3
Recent breakins / SSHD root hole?
The trojaned ssh client is nothing new to the hacker community, and the
statement in the previous thread claiming
"This type of man-in-the-middle attack (trojaned ssh) is not theoretical
anymore, and password authentication is broken."
is an example of how many poeple still think "hacking" is something very
difficult and nothing short of a genius is required to make the
2005 Oct 04
3
Net Rpc Logoff possible?
Hello!
I wonder if it is possible to send a logoff rpc signal?
If it is not possible as today would it be possible if we could trace
the rpc logoff signal sent p? MS own products?
Any suggestions are welcome!
Regards
Henrik
2018 Jan 29
2
opus manpages
Dear authors of Opus,
currently, the manpages that come with opus-tools
are written in the traditional man(7) markup language.
I am proposing to rewrite them into the semantic markup
of the mdoc(7) language. I am willing to do the work.
Both the man(7) and mdoc(7) languages have been around for decades,
and are supported by the prevalent formatters: groff(1) on most Linuxes
and mandoc(1) on the