penetration tester from a tool used by a
blackhat. The difference between the two is not in the tools,
it's in the contracts (i.e. approval of the target's owner).
--
Daniel Roethlisberger
http://daniel.roe.ch/
___
swinog mailing list
swinog
be interested in hearing from you off-list.
I'm especially interested in tests against proprietary SCTP
stacks, but any real-world SCTP services would be of interest.
Thanks,
-Daniel
[1] http://en.wikipedia.org/wiki/SCTP
[2] http://www.roe.ch/Nmap_SCTP
--
Daniel Roethlisberger
http
, you could implement SRS in order to
handle forwarding in an ``SPF compliant'' way. This will fix the
problem for all receivers which use SPF for scoring or rejection.
I am aware that this suggestion might well provoke yet another SPF/SRS
flamewar :-)
-Dan
--
Daniel Roethlisberger [EMAIL
scanner. It does not
solve all problems, but can solve some of them. (At a cost, of course.)
-Dan
--
Daniel Roethlisberger [EMAIL PROTECTED]
___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog
probably bogus information. Thanks anyway
for all responses!
Cheers
Dan
--
Daniel Roethlisberger [EMAIL PROTECTED]
___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog
address (end bits 01)?
-Dan
--
Daniel Roethlisberger [EMAIL PROTECTED]
___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog
the same?
-Dan
--
Daniel Roethlisberger [EMAIL PROTECTED]
___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog
/
public access networks
* TLS protects the RFC 2822 headers and RFC 2821 envelope too, which
S/MIME and PGP cannot
--
Daniel Roethlisberger [EMAIL PROTECTED]
___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman
8 matches
Mail list logo