I do not like scans but there are so many I report only the scans for
trojans.

----- Original Message -----
From: "Bill Lavalette noc/sec Administrator" <[EMAIL PROTECTED]>
To: "'Merton Campbell Crockett'" <[EMAIL PROTECTED]>
Cc: "'Security Related'" <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Sent: Sunday, February 20, 2000 12:55 AM
Subject: RE: Someone is scanning me




-----Original Message-----
From: Merton Campbell Crockett [SMTP:[EMAIL PROTECTED]]
Sent: Saturday, February 19, 2000 10:06 PM
To: Bill Lavalette noc/sec Administrator
Cc: 'Security Related'; [EMAIL PROTECTED]
Subject: RE: Someone is scanning me

On Sat, 19 Feb 2000, Bill Lavalette noc/sec Administrator wrote:

> The Bottom Line is this. YOU HAVE NO BUSINESS SCANNING ANYONE'S
> MACHINE!!!!!  unless it is requested by the owner/company

You're shouting does not alter the fact that I have a perfect right
and an
obligation to my employers and customers to probe your network.
[Bill Lavalette]  you better check your federal laws again.  you do
not
have any right or justification to snoop another network you are doing
the
same thing as the bad guy and no matter how you justify your actions
you
will lose in a court of law. I do this for a living and have been to
court.
a phone call is your best weapon how can you sit there and justify to
me a
nmap scan of my network ? give me a solid concrete example.

By allowing any packet originating from your network to pass into one
of
the
networks under my control, you have authorized me to monitor your
activity.
[Bill Lavalette]  this is only true of incoming packets you can not
launch
a sscan or Nmap scan of my network because I replied to a email or
sent
one?  lets be real.

Of course, my probes will be fairly straight forward as I will be
building
the foundation for a criminal investigation and a court case.
[Bill Lavalette]  and you will say..... I utilized the same hacking
tools
as the perpetrator and scanned a innocent host and found what?? Nmap
is a
good tool at very best all you will learn is what ports are open maybe
even
the os possibly a TCP sequence prediction but you have committed the
same
offense have you not? so I suppose with this line of thinking your
using if
you were Smurf attacked you would launch a Smurf of your own? this is
exactly what my point is.

The word, "scanning", is almost too generic a word to use.  It covers
a
wide
range of activities from a simple probe to verify that a system is
active
and could be the system originating questionable activity to an
extremely
aggressive
[Bill Lavalette]  a scan is a scan a probe is a probe they are not the
same
and the use is not the same as well . if I'm denying your traffic and
I see
you trying to gain access you have committed a offense in my book lets
be
realistic here you are aware of what I'm speaking of and you know this
to
be true why even bother to waste your time sending me a reply I truly
hope
for your sake that you  are not nmapping the world on every suspicious
packet that comes your way if so your setting yourself up for a big
fall.
least in my opinion.
attempt to locate open service ports on every system on a
network.



Merton Campbell Crockett

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to