At 4:26 pm +1000 28/6/06, David Guest wrote:
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature";
        micalg=sha1; boundary="------------ms090104060805030702050600"

Horst Herb wrote:
 On Wednesday 28 June 2006 13:25, Tim Churches wrote:
 I'd have to think about how to do that under Windos unfortunately. It
 could be a bit tricky.
 A Python script could do it, I think. I'll see what can be whipped up...

 easy peasy.

 import telnetlib

 host = 127.0.0.1
 ports = [1000,2000,3000]

 for port in ports:
        tn = telnetlib.Telnet(host, port)
        try:
                tn.open()
                tn.close()
        except:
                print "can't connect to host %s o port %d" % (host, port)


 Horst
Oh look, batteries.

You gotta luv your python.

David


When comparing port knocking to RSA keys:
3 knocks from 65536 possible ports results in probability of guessing at 1 in 2.8 x10^^14.
512-bit RSA key results in probability of guessing at 1 in 1.34x10^^154.
1024-bit RSA key default in ssh-keygen results in a very low probability (try squaring the number on the last line) of a brute force attack.

I guess that's why port knocking is reported as not quite taking off yet in the security community.
http://en.wikipedia.org/wiki/Port_knocking


Ian.

--
Dr Ian R Cheong, BMedSc, FRACGP, GradDipCompSc, MBA(Exec)
Health Informatics Consultant, Brisbane, Australia
Internet: [EMAIL PROTECTED]
(for urgent matters, please send a copy to my practice email as well: [EMAIL PROTECTED])

PRIVACY NOTE
I am happy for others to forward on email sent by me to public email lists.
Please ask my permission first if you wish to forward private email to other parties.
_______________________________________________
Gpcg_talk mailing list
[email protected]
http://ozdocit.org/cgi-bin/mailman/listinfo/gpcg_talk

Reply via email to