TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------

Hello all,

Be careful assuming that the AOL client will always be connecting on port 
5190� this is the default, but can be changed to almost *any* port number 
between 0 and 65K. Also, the servers the client connects to are farmed, and 
thus the IP address of the server changes every time the client makes a 
connection as demonstrated below�

C:\>ping login.oscar.aol.com

Pinging login.oscar.aol.com [205.188.7.172] with 32 bytes of data:

C:\>ping login.oscar.aol.com

Pinging login.oscar.aol.com [205.188.7.168] with 32 bytes of data:

C:\>ping login.oscar.aol.com

Pinging login.oscar.aol.com [205.188.7.172] with 32 bytes of data:

C:\>ping login.oscar.aol.com

Pinging login.oscar.aol.com [205.188.7.176] with 32 bytes of data:

C:\>ping login.oscar.aol.com

Pinging login.oscar.aol.com [205.188.7.176] with 32 bytes of data:

C:\>ping login.oscar.aol.com

Pinging login.oscar.aol.com [205.188.7.164] with 32 bytes of data:

The only constant is the host name that is being connected to 
(login.oscar.aol.com), so any capture would have to be based solely on that.
One other option... if you have a particular client that you wish to 
monitor... capture all their traffic, figure out what port they are running 
the AOL IM client on and then filter just on that port. It can still be 
messy however if they are running on a heavily used port such as 80, 135 or 
139...

Hope that helps a bit...

Regards

Ric




-----Original Message-----
From:   Matthew F. Caldwell [mailto:[EMAIL PROTECTED]]
Sent:   Saturday, September 16, 2000 11:26 AM
To:     [EMAIL PROTECTED]
Cc:     [EMAIL PROTECTED]
Subject:        Aol Instant Messeger


TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any 
problems!
----------------------------------------------------------------------------

Like Mark says you would be better off with a sniffer. However if you must
look at the traffic with real secure. You can create a connections rule in
your policy to watch for TCP port 5190 (realtime logging and play back).
Which I believe is the control port of the AIM protocol. Setup AIM on your
local machine and using netstat -an determine what ports the system is
communicating on then you can specify those ports in real secure or a
sniffer

--
Matthew F. Caldwell, CISSP - Chief Technical Officer
    Guarded.Net, Inc. Email: [EMAIL PROTECTED]
Ph:404.880.3373 Fx:404.880.3374 Cl:678-428-5095
---------------------------------------------------------
This e-mail may contain proprietary commercial information and is intended
for the addressed recipient(s) only. If you are not an addressed recipient
of this e-mail and have received it in error, you must delete it. You may
not forward or disseminate information contained in this e-mail without
permission from Guarded.Net.
Questions? Contact [EMAIL PROTECTED]
---------------------------------------------------------

_________________________________________________________________________
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com.

Share information about yourself, create your own public profile at 
http://profiles.msn.com.



Reply via email to