ot; in the message body, e.g., run the command
> echo unsubscribe | mail [EMAIL PROTECTED]
Signal 11 is SIGSERV (Invalud memory reference).
Probably bad hardware.
--
Alon Oz,
Aduva Research Team,
Mailto: [EMAIL PROTECTED]
--
It's Always Darkest just Before it goes Pitch Black.
==
d software that moves
data coming in to a network node out by the correct port to the next
node
in the network.
Usually when peple use it they mean the whole array of switches in the
network.
--
Alon Oz,
Aduva Research Team,
Mailto: [EMAIL PROTECTED]
--
A proud member in the Evil Linux cyberte
switch.
> Theoretical limit is 4.8Gbps in full duplex. Is it what the switching
> fabric value mean?
>
Yes.
--
Alon Oz,
Aduva Research Team,
Mailto: [EMAIL PROTECTED]
--
A proud member in the Evil Linux cyberterrorist hackers (ELCH)
organization
A who can launch Denial of
, network address
> or plain IP address
>
You dig all the domains under icq.com and add block rules for it in a
loop.
(man dig, man $YOUR_FAVORATE_SHELL)
--
Alon Oz,
Aduva Research Team,
Mailto: [EMAIL PROTECTED]
--
A proud member in the Evil Linux cyberterrorist hackers (ELCH)
organizati
Jonathan Ben-Avraham wrote:
>
> On Mon, 25 Dec 2000, Alon Oz wrote:
>
> > Jonathan Ben-Avraham wrote:
> > >
> > > On Mon, 25 Dec 2000, Alon Oz wrote:
> > >
> > > > Jonathan Ben-Avraham wrote:
> > > > >
> > >
l reveals the real IP of the computer running the client,
so even if you use GNU replacements it doesn't matter.
This "feature" opens a window for "crackers" to use various firewall
penetrating/piercing techniques.
--
Alon Oz,
Aduva Research Team,
Mailto: [EMAIL PROTECT
Ishay Sommer wrote:
>
> email headers sent via smtp include the original ip from which the message
> sent from
>
Not if you make a few changes to the mailer (checked on qmail/sendmail)
--
Alon Oz,
Aduva Research Team,
Mailto: [EMAIL PROTECTED]
--
A proud member in th
Nadav Har'El wrote:
>
> On Mon, Dec 25, 2000, Alon Oz wrote about "Re: ipchains":
> > The ICQ protocol reveals the real IP of the computer running the client,
> > so even if you use GNU replacements it doesn't matter.
>
> So what? Unless you have a
ive connection to the ICQ port
3. the NAT gateway/fw allows "related" packets to pass from icq to
192.168.1.78
4. icq packets are classified as "related".
Now any man-in-the-middle attack becomes very easy.
You spoof your address (using known flaws in DNS)
and easily get into
sysadmin was an idiot, if a sysadmin wants
he can easily block ICQ. Ofcourse he'll have to know
how to do it or it will not be effective (like in your situation).
And that's what all this thread is about.
--
Alon Oz,
Aduva Research Team,
Mailto: [EMAIL PROTECTED]
--
A proud member in the
Moshe Zadka wrote:
>
> On Tue, 26 Dec 2000 17:53:08 +0200, Alon Oz <[EMAIL PROTECTED]> wrote:
>
> > As you said, the sysadmin was an idiot, if a sysadmin wants
> > he can easily block ICQ.
>
> ssh UDP forwarding to home machine. 'Nuff said.
1 prob
Moshe Zadka wrote:
>
> On Tue, 26 Dec 2000, Alon Oz <[EMAIL PROTECTED]> wrote:
>
> > 1 problem though, by using firewall piercing techniques you probably
> > violate your contract with the company.
>
> And what part of "I'm an advocate of company po
llegal in US? News for me. Is WAV going to be banned too?
Using copyrighted material which you do not own is illegal.
Storing mp3 SONGS that you did not buy/have the disk is
basically illegal, I'm sure you can find alot of sources
on the web about this. (See Metallica VS. Napster)
--
Alon O
Most firewalls won't even allow you to do this.
DNS isn't the only thing that can be spoofed, basically anything can.
and usually when you put a DNS based rule into the firewall its
simply translated to IP on the spot (and stayed with these values).
--
Alon Oz,
Aduva Research Team,
Mai
the ongoing effort!
Nice of you sticking to an unimportant part that i brought as an
example,
Too bad that you did not answer to the real issue and just got into
nitpicking about things where my intentions were pretty clear.
I'd recommend you to stay away from threads that contain info
you do
xecutables, they might
be part of copyrighted software.
But then again, this is _way_ off topic..
--
Alon Oz,
Aduva Research Team,
Mailto: [EMAIL PROTECTED]
--
A proud member in the Evil Linux cyberterrorist hackers (ELCH)
organization
A who can launch Denial of Service attacks against the em
man chmod, man chattr.
> hi
>
> I have a dirctory ~user1 ( which is owned by user 1)
> I have a subdir ~user1/changes
> I want the user to be able to write to ~user1/ and to ~user1/changes/
> but i do not want him to be able to rmdir ~user1/changes
>
> is there a way ?
> ( i am aware of a way of
e via email and not the mailing list.
The price is 150$ (negotiable)
--
Alon Oz,
Aduva Research Team,
Mailto: [EMAIL PROTECTED]
--
Buckle Up it makes it harder for the aliens to suck you out of the car.
=
To unsubscribe, send ma
ders contains info
just like all the other pakcets.
the syn and ack are just flags in the tcp header.
Alon Oz
=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]
19 matches
Mail list logo