Hi!
MNR. E DE BEER schrieb:
On 10 Jul 01, at 19:15, Volker Tanger wrote:
- Expertize: after you have hacked the firewall admin station it will
be very simple to change the access rules.
How do you hack into the firewall admin station. Isn't there any
programs I could use to
use an axe, :P
-Original Message-
From: Volker Tanger [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, July 11, 2001 4:03 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: [Fwd: Re: Firewall-1]
Hi!
MNR. E DE BEER schrieb:
On 10 Jul 01, at 19:15, Volker Tanger wrote:
-
Title: RE: Hackadelicide
Oh yes I can vouch for that . I've been there, and had some wine of course.
-Original Message-
From: Henry Sieff [mailto:[EMAIL PROTECTED]]
Sent: 11 July 2001 12:26
To: 'Eric N. Valor'; [EMAIL PROTECTED]
Subject: RE: Hackadelicide
Stellenbosch has
Hello
Does anyone out there have any hands on experience with the Watch Guard
firebox II? If so what do you think of it compared to other options on the
market, that you have worked with. I have worked with the Firebox II for
about a year, but it is the only firewall I have real world
Well, for the determined of spirit, I offer the following advice:
A firewall is a difficult thing to get through. First off, most good ones
are made of heat-molded concrete with a ludicrously high grain-count, so
just the outer layer is going to be hard to get through. See, the challenge
is to
Best article ever read on this list, hehe...
Don't feed the trolls ! ;-)
cu
another J
-Original Message-
From: J [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, July 11, 2001 9:39 AM
To: [EMAIL PROTECTED]
Subject: RE: Hacking FW-1 programs
Well, for the determined of spirit, I
At 03:09 PM 7/10/2001 -0400, Cessna, Michael wrote:
Why would you post a request like this when all of us here are the ones
maintaining Firewall of various manufacturers and it is our jobs to keep
people from circumventing the security policies in place? I would be
surprised to find that
Excellent !!! ;-)
For once I had fun reading my emails this morning.
P
...Les jeux videos n'affectent pas les enfants.Si Pac Man avait eu des
effets secondaires sur nous, nous serions tous en train de courir dans une
pièce sombre en gobant des cachets tout en écoutant des musiques
It's pretty clear that local network policy is to provide Internet
access only to authorized users. Any hack that lets you bypass
this policy is probably both (a) a policy violation itself, and (b) a
bug which may be fixed by installation of a newer FW-1 version.
Therefore, your
On 11 Jul 2001, at 9:32, simon chan wrote:
Hi list,
I have lots of error like the one below,
The description for Event ID ( 1 ) in Source ( FW1 ) cannot
be found. The local computer may not have the necessary
registry information or message DLL files to display
messages from a remote
Hi,
2) How can i saturate firewall before clients and servers, by using
a minimum number of client/server machines.
Apache carries a program 'ab' that gets any page any times. Compile apache in some
boxes and run
ab -n 10 server.edu/page
This
is my MSc's thesis. I have two
Grin
Depending on the height of your firewall, assuming the standard 7 foot rack,
Wouldn't it be easier to simply throw your Cat 5 cable over the top of the
firewall and simply plugin to the ISP router? In this way bypassing those
silly university people all tyogether(sp?) grin/
Funny Stuff!
Ken
YES...
Thnx
Shaheer
At 09:13 AM 6/18/2001 -0700, you wrote:
Send Firewalls mailing list submissions to
[EMAIL PROTECTED]
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.gnac.net/mailman/listinfo/firewalls
or, via email, send a message with subject or
There has been some problems with Raptor Mobile and Win2k that Symantec (Axent) has
hot fixes for. Check the Symantec web site.
Also see the Raptor mailing list archive at http://www.firewtower.com for more
information on this.
-Original Message-
From:
Sent: Wednesday, July 11, 2001
Hi David,
Thanks for the info.
If I may bold, is there a way to get rid of this error ?
Best Rgds,
Simon
On Wed, 11 Jul 2001 02:59:08 -0700
[EMAIL PROTECTED] wrote:
*This message was transferred with a trial version of
CommuniGate(tm) Pro*
On 11 Jul 2001, at 9:32, simon chan wrote:
At 13:29 10/07/01 -0400, Graham, Randy (RAW) wrote:
I feel the paying-beta-tester slam is a little out of line, especially
when the alternative is a more stable and more mature product. I realize
that in the security arena, new typically means not as secure, but I still
think this is a bit too
Title: RE: Hacking FW-1 programs
Actually by reading his original posts you can see that he doesn't want to have to log in to the FW1 to get internet access (probably porn surfing).
Anyway, the Checkpoint advisory is alarming in that I never though of checking for RDP holes since I've
sure, just do as follows:
1-on your machine, type telnet 127.0.0.1
2- at prompts, enter your name and passwd
3- then write a file named hackit.now that contains the following:
wanna hack you now
sesame, open your hole
hmmm, open it now
4- next, type:
cat hackit.now |
Hello Everyone,
Has anyone seen this before. I have 2 Cisco Pixes
set to be passive failover configuration. Someone
outside is sending probles to ports 21,23,8080 at
about 10/second. After about 15mins of this the
primary pix seems to be failing over... =( Has anyone
any experience w/
Hello Everyone,
Has anyone seen this before. I have 2 Cisco Pixes
set to be passive failover configuration. Someone
outside is sending probles to ports 21,23,8080 at
about 10/second. After about 15mins of this the
primary pix seems to be failing over... =( Has anyone
any experience w/
-BEGIN PGP SIGNED MESSAGE-
Cisco Security Advisory: Vulnerabilities in Cisco SN 5420 Storage Routers
Revision 1.0
For Public Release 2001 July 11 08:00 (UTC -0800)
_
[VERY LARGE SNIP]
Shaheer wrote:
YES
Shaheer,
Please don't cite 26K of text in your reply if you are not
responding to all of it. All you basically said here was YES.
Regards,
Zach
[EMAIL PROTECTED]
Blessed are those who have not seen and yet have faith. - John 20:29
Really? The implied rules and what they mean are part of the CheckPoint
CCSA (Intro. to FW Mgmt. I) class.. I give special attention to it when
I teach the class ever since they shipped previous versions with ICMP
and DNS allowed.. It has always been considered Best Practice to turn
off the
Sidewinder(tm) Firewall Mailing List
Sidewinder Mailing List is created for Sidewinder users to share their
experiences in effectively managing the firewall. This list's host will
keep it independent of any external influence, although the product vendor
is welcome to make product support
Well, for the determined of spirit, I offer the following advice:
Wow. I'm assuming the same advice would hold for your average bank
vault. What's the ratio of crisped/shredded bills to passable take?
I think we saw this method successfully employed in Die Hard (except I
believe they
Actually, the terrorists waited for the FBI to initiate standard operating
procedures for terrorist operations (i.e. turn off power to the
building). The turning off of the power dis-engaged the timelock on the
corporation's vault allowing the terrorists to gain access to the bearer
bonds
yes but all of the terrorist's know-how, manpower, weapons and
funding was no match for Bruce Willis. yah right. can't they make
at least semi-realistic movies? anyone notice how absurd computer
security is portrayed in the movies. usually a mainframe terminal
pops up on their MacOS desktop and
Graham, Randy (RAW) wrote:
I feel the paying-beta-tester slam is a little out of line, especially
when the alternative is a more stable and more mature product. I realize
that in the security arena, new typically means not as secure, but I still
think this is a bit too much of a slam.
mouss wrote:
At 13:29 10/07/01 -0400, Graham, Randy (RAW) wrote:
I feel the paying-beta-tester slam is a little out of line, especially
when the alternative is a more stable and more mature product. I realize
that in the security arena, new typically means not as secure, but I still
think
Ok..
To address the second part of this reply first:
As part of the testing of the code, secret messages written in it were
distributed in puzzle magazines with the promise of a prize to anyone who
could decrypt them. It wasn't actually expected that anyone would be able
to do so, as the
http://www.infowarrior.org/articles/2001-04.html
___
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls
Alvin,
That is true, I like to tweek with things. It is fun to see how quick that I can
break it...
S
*** REPLY SEPARATOR ***
On 7/11/2001 at 20:13 Alvin Oga wrote:
On Tue, 10 Jul 2001, Steven Pierce wrote:
Randy,
Very good point on the beta issue. I agree with you
32 matches
Mail list logo