Jump to content

Mike S.

Active Members
  • Posts

    18
  • Joined

  • Last visited

Posts posted by Mike S.

  1. The name is Mike S.

    Favorite game: Operation Flashpoint, Halflife 2

    Favorite OS: any flavour of Windows

    Favorite console: don't have one

    Nationality: German

    Accent: Bavarian

    Sex: Male

    Age:41 (I seem to be the oldest here...)

    Race: German

    Height: 184cm

    Status: Married, 2 children

    Favorite band: Blank & Jones

    Favorite book: Necromancer

    Favorite author:

    Favorite movie: I really like the idea of the Matrix, but I hate the Kung Fu scenes

    Favorite director:

    Favorite TV Show: IT Crowd, Doctor Who and Torchwood (all UK based)

    Favorite actor: Myself

    Favorite actress: Sharon Stone

    Favorite Pinup:

    Favorite Comedian: Guenther Gruenwald (bavarian Comedian)

    Other hobbies: BBQ, Travelling and just mainly learning something new

    Car: Fiat Bravo (Unfortunately I had to sell my Jeep Cherokee due to the gas prices)

    Occupation: IT Trainer (Microsoft, Checkpoint, EC-Council)

  2. I'm doing a test out training course and following as I go along covering 2k3 infrastructure right now. I'm running 1 server 2k3 Enterprise Edition and the other 2k3 R2 Standard Edition. On the 2k3 R2 Server the DNS server properties I have no security tab. I'm trying to set permissions on the DNS server so I can connect to that DNS server, but can't figure out how to do so being that I have no Security tab.

    Anyone have any idea why? Also no options in Group Policy have been set yet.

    For what do you need a security tab? You are only able to configure DNS when you are at least belong to the group 'DNS-admin' or the normal 'administrator'. As a member of the group 'DNS user' you have readonly access to the DNS-mmc. When the DNS is AD-integrated there are ACLs behind each entry...

    For me its pretty secure when is at the newest patch level.

    Mike

  3. Why is it that even in this day and age that network administrators cannot understand to filter mac addressing is important.

    Yes i have taken in to account that indeed a mac address can be spoofed and used on a different computer, as many are now changeable on the network card, but at the end of the day it is a first line defense. Needs to be considered and used. Network attacks and hacks would go down for example networks would not talk to mac addresses that weren't listed on a central server list?

    I am surprised that security companies do not devolop software that allows you to filter your traffic on servers based on the mac address. Although this can be done at switching level it is only available in smart switching such as Cisco Devices.

    I know that it is hard to implement and manage, but in high security networks where data security and prevention against attacks such as Hospitals this should be taken in to account.

    Like you said, MAC addresses can be spoofed (in windows it's a registry key).

    Why don't you use 802.1X?

    You will need a CA and a RADIUS server and machine certificates in addition to the 802.1X capable switch. Then the machine authenticates to the switchport and the PC is only able to access the network if he is sucessful authenticated.

    Mike

  4. I really like the Apple ads, but they are painting black (the dumb PC) and white (the smart Mac). The marketing of Apple is brilliant and there are people which are in love with Mac. There are other people as well, they love Linux, MVS, OS/400, OS/2 and Windows...

    I think the ad "I'm a PC reminds the people how versatile Windows is", and thats good!

    I personally love my Compaq TC4200 Tablet notebook with windows on it. All my loved tools are running on it and I do not want to miss Onenote2007. I really like my Vista Business as well, everything is running smooth...

    What did I wrong?

    Mike

  5. WEP, WPA, WPA2 don't send their passwords across the network, they exchange information which they encrypt and send send back to prove the both know the passwords. The only way I know to get a WEP key without packet capturing from the real network is to use the cafe latte attack (from the guys are Airtight I think).

    Do you mean on that is associated to Jasager? If so, use the Kick MAC function, if you mean from a different AP then that would mean sniffing networks for other connections which wouldn't work too well with the card being in AP mode.

    Thanks for your answer. I finally managed to install openwrt mith jasager on it (shame on me that it took so long) and played with it a bit.

  6. If possible, it would be great to get the password to the network, regardless if it's WEP, WPA or WPA2. This would be a convenient way to collect passwords to networks without the need of paket injection, use of endless password lists or brute force.

    Ah, one more idea: Could you implement a function to send a disassociation paket to a specific workstation?

  7. Yesterday I tried without success to put openwrt onto the FON... :-(

    With the description on "http://uselesshacks.com/hacks/fon-router-h...guide/#rbenable" it was no problem to implement dd-wrt (which doesn't help in this case).

    Darren: You showed a neat application from freifunk to flash openwrt during 3x07. In which state should the FON be to receive the image successful? I've tried it in differend ways without luck. Do you have a hint?

    Mike

  8. Fantastic show! Unfortunately due to the time difference to Germany I had to wait nearly the whole day until I was able to download it.

    Hey Darren, you German is brilliant!

    Got my fon router today and connot wait to put openwrt and jasager onto it...

    Regards,

    Mike

  9. Hi Darren,

    I really liked your new episone and I'm looking forward to see the next one!

    I was pretty surprised as you said that the name of the pineapple-project is German. It was funny how you pronounced it... ;) (Should be something like JaSaaaager)

    Greetings from Germany!

    Regards,

    Mike

×
×
  • Create New...