I think it would be interesting to enumerate incoming connections.
user (192.168.0.2) -- router (192.168.0.1) -- gateway/masquarade -- --
server (0trace).
What do you think about it? is it possible to enumerate internal user user
network?
On Friday, 2007-09-28 at 11:43 GMT, [EMAIL PROTECTED] wrote:
I think it would be interesting to enumerate incoming connections.
user (192.168.0.2) -- router (192.168.0.1) -- gateway/masquarade --
--
server (0trace).
What do you think about it? is it possible to enumerate internal user
On Sun, 2007-01-14 at 00:49 +0100, Robert Święcki wrote:
Michal Zalewski wrote:
Note: this is a 30-minute hack that involves C code coupled with a cheesy
shellscript. It may not work on non-Linux systems, and may fail on some
Linuxes, too. It could be improved in a number of ways - so if
Michal Zalewski wrote:
Note: this is a 30-minute hack that involves C code coupled with a cheesy
shellscript. It may not work on non-Linux systems, and may fail on some
Linuxes, too. It could be improved in a number of ways - so if you like
it, rewrite it.
Slightly rewritten version in C,
LFT is similar to tcptraceroute in that it uses TCP SYN probes. As
Michal stated in his original message, 0trace is different as it
piggybacks on an already established TCP connection.
Regards,
Jon Oberheide
On Tue, 2007-01-09 at 09:03 +0100, Alessandro Dellavedova wrote:
Hi,
am I wrong
Hi,
am I wrong or the mechanism that you implement is similar to the one
implemented in lft (Layer Four Traceroute http://pwhois.org/lft/ ) ?
From the homepage:
LFT is the all-in-one traceroute tool because it can launch a
variety of different probes using both UDP and TCP layer-4
On Tue, 9 Jan 2007, Alessandro Dellavedova wrote:
am I wrong or the mechanism that you implement is similar to the one
implemented in lft (Layer Four Traceroute http://pwhois.org/lft/ ) ?
No, what you describe is similar to tcptraceroute, from what I understand
(they use stray SYNs or RSTs or
Michal Zalewski wrote:
I'd like to announce the availability of a free security reconnaissance /
firewall bypassing tool called 0trace. This tool enables the user to
perform hop enumeration (traceroute) within an established TCP
connection, such as a HTTP or SMTP session. This is opposed to
I'd like to announce the availability of a free security reconnaissance /
firewall bypassing tool called 0trace. This tool enables the user to
perform hop enumeration (traceroute) within an established TCP
connection, such as a HTTP or SMTP session. This is opposed to sending
stray packets, as
On Sun, 7 Jan 2007, Michal Zalewski wrote:
[ Of course, I might be wrong, but Google seems to agree with my
assessment. A related use of this idea is 'firewalk' by Schiffman and
Goldsmith, a tool to probe firewall ACLs; another utility called
'tcptraceroute' by Michael C. Toren
10 matches
Mail list logo