Re: fooling nmap

2004-09-05 Thread Chuck Swiger
vxp wrote: On Sat, 4 Sep 2004, Colin Alston wrote: My point was if it provides no security, then there is no point to it at all. oh, but it does. it prevents them from gathering accurate information about your system. that's an extremely important part of the attack. From your perspective, certainl

Re: fooling nmap

2004-09-04 Thread Clark Gaylord
Barney Wolff wrote: On Sat, Sep 04, 2004 at 01:28:28PM -0400, vxp wrote: in other words, what would you guys say be a _proper_ bsd-style thing to do, if this were to be done? Nothing. If you want to pollute your kernel with nonsense of this sort, go right ahead, but leave mine alone. Adding frill

Re: fooling nmap

2004-09-04 Thread Barney Wolff
On Sat, Sep 04, 2004 at 01:28:28PM -0400, vxp wrote: > > in other words, what would you guys say be a _proper_ bsd-style thing to > do, if this were to be done? Nothing. If you want to pollute your kernel with nonsense of this sort, go right ahead, but leave mine alone. Adding frills detracts f

Re: fooling nmap

2004-09-04 Thread Ɓukasz Bromirski
vxp wrote: oh, but it does. it prevents them from gathering accurate information about your system. that's an extremely important part of the attack. Well, most of the automated trojans seen recently just connect and try to execute some specific code. You won't beat them with turning off timestamps

Re: fooling nmap

2004-09-04 Thread vxp
On Sat, 4 Sep 2004, Colin Alston wrote: > My point was if it provides no security, then there is no point to it at > all. oh, but it does. it prevents them from gathering accurate information about your system. that's an extremely important part of the attack. > Most attackers are going to expl

Re: fooling nmap

2004-09-04 Thread Colin Alston
vxp wrote: On Sat, 4 Sep 2004, Wesley Shields wrote: That is true, but the problem with these kinds of things is that users will think that with a simple flip of a sysctl they are secure, when in fact that are no more secure than before. that's also 100% true, however that's why documentati

Re: fooling nmap

2004-09-04 Thread vxp
On Sat, 4 Sep 2004, Wesley Shields wrote: > > That is true, but the problem with these kinds of things is that users > will think that with a simple flip of a sysctl they are secure, when in > fact that are no more secure than before. that's also 100% true, however that's why documentation exists.

Re: fooling nmap

2004-09-04 Thread Petri Helenius
Colin Alston wrote: What exactly is the point/benefit of such a change? On related note, it would be nice if the OS bundled dhclient would report OS version like it does on Windows and Linux. Would make some operations easier. Pete ___ [EMAIL PROTECTED

Re: fooling nmap

2004-09-04 Thread Wesley Shields
On Sat, Sep 04, 2004 at 10:07:36AM -0400, vxp wrote: > no. obscurity as the _only_ "security" is no security. > there's nothing wrong with ADDING obscurity, however. =) > > --Val That is true, but the problem with these kinds of things is that users will think that with a simple flip of a sysctl

Re: fooling nmap

2004-09-04 Thread vxp
no. obscurity as the _only_ "security" is no security. there's nothing wrong with ADDING obscurity, however. =) --Val On Sat, 4 Sep 2004, Colin Alston wrote: > vxp wrote: > > >pretty much any sort of attack / intrusion attempt begins with information > >gathering on the machine. part of that, wo

Re: fooling nmap

2004-09-04 Thread Colin Alston
vxp wrote: pretty much any sort of attack / intrusion attempt begins with information gathering on the machine. part of that, would be trying to figure out what OS runs on the machine. the more (accurate) information a potential attacker can gather on the machine, the more chances that his attempt

Re: fooling nmap

2004-09-04 Thread vxp
pretty much any sort of attack / intrusion attempt begins with information gathering on the machine. part of that, would be trying to figure out what OS runs on the machine. the more (accurate) information a potential attacker can gather on the machine, the more chances that his attempt will succee

Re: fooling nmap

2004-09-04 Thread Colin Alston
vxp wrote: Hi, I'm wondering if it'd be a good idea / worth it to modify the kernel a bit and add a few sysctl switches so the user would be able to choose what OS he wants the box to appear as, to a nmap scan ? It'd require, obviously, a few modifications to the networking code. Please elaborate o

fooling nmap

2004-09-04 Thread vxp
Hi, I'm wondering if it'd be a good idea / worth it to modify the kernel a bit and add a few sysctl switches so the user would be able to choose what OS he wants the box to appear as, to a nmap scan ? It'd require, obviously, a few modifications to the networking code. Please elaborate on why you