hping2

1999-11-16 Thread antirez
ersion is the 2.0.0-beta52 and is downloadable from http://www.kyuzz.org/antirez/hping2.html bye, antirez >From hping2 README: DESCRIPTION hping2 is a network tool able to send custom ICMP/UDP/TCP packets and to display target replies like ping do with ICMP replies. hp

more about IP ID

1999-11-22 Thread antirez
For exaple the ability to scan the ports with only spoofed packets and the ability to guess remote hosts traffic are a lot real). ciao, antirez

Re: FTP denial of service attack

1999-12-08 Thread antirez
lts in the ability to perform this kind of DoS against a very big server using little resources. antirez

Re: FTP denial of service attack

1999-12-10 Thread antirez
ept2 that return just after SYN was received so we can obtain the IP address and then use accpet2_reset() to RST or accept2_ok() to follow the threeway handshake. Since this can be implemented using new syscall API compatibility is preserved, but this seems a lot better than modify on the fly firewalling rules. antirez

Re: usual iploggers miss some variable stealth scans

2000-01-24 Thread antirez
OS TCP/IP stacks synchronization is so hard to reached maybe we need some RFC that comments all not clear TCP/IP issue? I want hope that vendors (except Microsoft...) will follow the RFC. antirez

Re: Tempfile vulnerabilities

2000-02-07 Thread antirez
used to pool from /dev/random remotely. An example? the old TERM="../../../bla" problem. antirez

Re: unused bit attack alert

2000-02-23 Thread antirez
ase don't claim you have discovered it (see BUGTRAQ archive). antirez -- Salvatore Sanfilippo, Open Source Developer, Linuxcare Italia spa +39.049.8024648 tel, +39.049.8036484 fax [EMAIL PROTECTED], http://www.linuxcare.com/ Linuxcare. Support for the revolution.

glibc resolver weakness

2000-05-03 Thread antirez
very query a 128-bit ID as 'echo response', so that I'll search it as 'echo reply' in the response. You aren't paranoic? Just use your resolvers without any changes. It's just an idea. regards, antirez -- Salvatore Sanfilippo, Open Source Developer,

ICMP fragmentation required but DF set problems.

2001-01-15 Thread antirez
oit just to confirm this, don't ship it to lame people. I want not to release my proof-of-concepts code. That's all, can someone confirm this? regards, antirez -- Salvatore Sanfilippo | <[EMAIL PROTECTED]> http://www.kyuzz.org/antirez | PGP: finger [EMAIL PROTECTED]

Re: ICMP fragmentation required but DF set problems.

2001-01-16 Thread antirez
ttacker send some packet, get the HMAC and use it in the quoted packet) and a random number. Or some other way that can ensure that the given packet was sent by one end to another end. Note that this is pretty different from the IPSEC stuff. antirez -- Salvatore Sanfilippo

Re: ICMP fragmentation required but DF set problems.

2001-01-23 Thread antirez
On Sun, Jan 21, 2001 at 04:40:53PM +0100, Pavel Kankovsky wrote: > On Mon, 15 Jan 2001, antirez wrote: > > > It's possible to slowdown (a lot) connections between two > > arbirary hosts (but at least one with the PMTU discovery enabled) > > using some spoofed TC

Re: ICMP fragmentation required but DF set problems.

2001-01-23 Thread antirez
ignore the option, that contains the HMAC, but unfortunatelly all kinds of firewalls will drop this packets. With IPv6 the clearest way seems a new next-header with the HMAC that provide the autentication. No key exchange is needed, you just sign your own packets to recognize it later. antirez -

netfilter module to make the ICMP DF set but frag req more hard

2001-02-01 Thread antirez
, expecially about the concepts, not the implementation. For example cryptographers shoud be able to suggest a better (faster, less CPU consuming) way to mark the packets. I don't guarranty that this module will not crash your linux 2.4 box, and that it really works. See yourself. antirez -- Salv

Re: FreeBSD-SA-01:48: tcpdump contains remote buffer overflow

2001-07-18 Thread antirez
n security. Sure, there are operating system extensions that can handle the problem better, like capabilities, but maybe is important to remember that often setuid() & co. are a way to reach a similar effect in a portable way. regards, antirez -- Salvatore Sanfilippo <[EMAIL PROTECTE

predictable ip->id patch

1999-10-26 Thread antirez
y), if you find some problem please send me an email. The patch is for linux 2.2.13. regards, antirez -- Salvatore Sanfilippo [EMAIL PROTECTED] [EMAIL PROTECTED] ALICOM snc Tel: +39-0871-403522 Fax: +39-0871-41960 Web: www.alicom.com pgp key: finger [EMAIL PROTECTED] [2852F54A49653

iplogger Ymas problem

1999-07-19 Thread Salvatore Sanfilippo -antirez-
hostlookup(hdr.ip.ip_src.s_addr, (syncount != SYN_FLOOD)), inet_ntoa(hdr.ip.ip_src)); } ciao, antirez -- Salvatore Sanfilippo - antirez - [EMAIL PROTECTED] try hping: http://www.kyuzz.org/antirez [EMAIL PROTECTED]

to prevert port scanning in linux 2.0.x

1999-07-20 Thread Salvatore Sanfilippo -antirez-
if the port is open, like win*. If an attacker scans a patched host it gets all ports are open, so it gets nothing. The patch is tested on linux 2.0.36, maybe it's good even for 2.0.37. bye, antirez -- Salvatore Sanfilippo - antirez -

Re: Linux blind TCP spoofing, act II + others

1999-08-06 Thread Salvatore Sanfilippo -antirez-
_REPLY packets is equal to (the > number of packets sent by A in x second) +1. "Idle portscan" by antirez uses > this technique. Re, i think that a consecutive IP id now can be considered a weakness in IP stacks. Using it you today are able at least to scan spoofed

Re: Linux blind TCP spoofing, act II + others

1999-08-10 Thread Salvatore Sanfilippo -antirez-
to predict RNG send me an email. antirez On Sat, Aug 07, 1999 at 09:58:10AM -0700, David Wagner wrote: > In article <[EMAIL PROTECTED]>, > Salvatore Sanfilippo -antirez- <[EMAIL PROTECTED]> wrote: > > i think that a consecutive IP id now can be considered > >