At 4:26 pm +1000 28/6/06, David Guest wrote:
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature";
micalg=sha1; boundary="------------ms090104060805030702050600"
Horst Herb wrote:
On Wednesday 28 June 2006 13:25, Tim Churches wrote:
I'd have to think about how to do that under Windos unfortunately. It
could be a bit tricky.
A Python script could do it, I think. I'll see what can be whipped up...
easy peasy.
import telnetlib
host = 127.0.0.1
ports = [1000,2000,3000]
for port in ports:
tn = telnetlib.Telnet(host, port)
try:
tn.open()
tn.close()
except:
print "can't connect to host %s o port %d" % (host, port)
Horst
Oh look, batteries.
You gotta luv your python.
David
When comparing port knocking to RSA keys:
3 knocks from 65536 possible ports results in probability of guessing
at 1 in 2.8 x10^^14.
512-bit RSA key results in probability of guessing at 1 in 1.34x10^^154.
1024-bit RSA key default in ssh-keygen results in a very low
probability (try squaring the number on the last line) of a brute
force attack.
I guess that's why port knocking is reported as not quite taking off
yet in the security community.
http://en.wikipedia.org/wiki/Port_knocking
Ian.
--
Dr Ian R Cheong, BMedSc, FRACGP, GradDipCompSc, MBA(Exec)
Health Informatics Consultant, Brisbane, Australia
Internet: [EMAIL PROTECTED]
(for urgent matters, please send a copy to my practice email as well:
[EMAIL PROTECTED])
PRIVACY NOTE
I am happy for others to forward on email sent by me to public email lists.
Please ask my permission first if you wish to forward private email
to other parties.
_______________________________________________
Gpcg_talk mailing list
[email protected]
http://ozdocit.org/cgi-bin/mailman/listinfo/gpcg_talk