Hello,
On a network I've recently had the pleasure :) to audit I came up
with a bunch of hosts which nMap classifies as 'unknown', but with
predictable TCP Sqeuence(s). Now...are there any tools out there for either
Linux/Win2k that will allow me to exploit this type of 'vulnerability'?
These hosts don't return any other open port information, so I'm guessing
they're either switches, or routers or VPN concentrators...is there any way
to determine which of those it most likely is? Are there any patterns to
look for, when determining router/switch/vpn box??
Thanks in advance.....something I don't know and I figured I'd ask...
Cheers!
----------------------------------------|
Ralph M. Los
Sr. Security Consultant and Trainer
EnterEdge Technology, L.L.C.
[EMAIL PROTECTED]
(770) 955-9899 x.206
----------------------------------------|
----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/