+++ Abhi [linux-india] <07/05/02 17:46 +0900>:
> In this particular case, just find an exploit for the squid... and we
> already know the network topology... so we can go for the gold...
Once you have compromised his firewall and are inside it, his internal
network no longer remains internal, and it is pretty trivial to find out what
topology he is using, once inside the firewall.
Like you say, and I agree, he shouldnt be running an insecure squid in the
first place. Or maybe just use iptables to restrict access to squid to his
own network. Or run the squid cache on a host within his NATted network,
without exposing it to the outside world.
-srs
--
Suresh Ramasubramanian <----> mallet <at> efn dot org
EMail Sturmbannfuhrer, Lower Middle Class Unix Sysadmin
[Linux One Stanza Tip] From : <[EMAIL PROTECTED]>
LOST #140 -**< Sub : Line numbering your programs (#2) >**-
Want a listing of your program with line numbers ?
Try: grep -n $ my_prog.c > my_prog.no.c
-n is to number a line; and $ for till end ...
_______________________________________________________________
Have big pipes? SourceForge.net is looking for download mirrors. We supply
the hardware. You get the recognition. Email Us: [EMAIL PROTECTED]
_______________________________________________
linux-india-help mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/linux-india-help