Hi

21 Apr 2001, "L.D. Best" <[EMAIL PROTECTED]> wrote:

 LB> I think that the ability of a hacker to access any "work station" on
 LB> a network is pretty much totally dependent upon the network & its
 LB> servers.
??? with the expection of firewalls and network intrudion detection
systems it is *only* dependant on your 'workstation'.
(eg if malicious packets are not stopped at the gateway to your network,
they can do whatever they want)

 LB> It certainly shouldn't be OS dependent [i.e. DOS more
 LB> hackable than Linux].
It certainly is !!!
there are cillions of OS dependant security vulnerabilities.
Although DOS is not a good target.
The only thing you could do with DOS is try to crash it.
Under Linux the maingoal is to get a rootshell.

 LB> Now it *could* be possible [particularly in my case, with a permanent
 LB> IP] to access my system in some manner, if the person knew both the
 LB> 'proxy IP' and my fixed IP.
Why do they need to know you proxy ???
if you are completely protected by a firewall, than I can't get through
your computer. (independant weather I know the IP of your proxy server or
not.)

 LB> It might be possible for a hacker to send machine code that rebooted
 LB> my system [like some web pages do], but that would be a pain rather
 LB> than an invasion.
It's usually not machine code, but simply an exploit to existing tcp/ip
kernel code. (eg Winnuke which sent a packet which pretended to be huge,
and win95 tcp/ip stack has gone to heaven [or hell?])

if machinde code is sent, than it is usually done via a buffer overflow
bug.

 LB> l.d.

CU, Ricsi

-- 
|~)o _ _o  Richard Menedetter <[EMAIL PROTECTED]> {ICQ: 7659421} (PGP)
|~\|(__\|  -=> Madness takes its toll. Please have exact change! <=-

Reply via email to