Jump to content

decepticon_eazy_e

Active Members
  • Posts

    164
  • Joined

  • Last visited

Everything posted by decepticon_eazy_e

  1. Has anyone run a SmarterMail server or had to maintain one? I have a client with this and I need to be able to lock it down and find all the holes. I've googled and checked Milworm, and I haven't found any exploits in the latest version. Does anyone have any inside information on this thing? Specifically... Smartermail Enterprise 5.5 on Windows Ser 2003. I'm looking for holes from the outside if there are any, I want to be able to say this is locked down... ya know!
  2. Is the tv card on vmware's HAL list? I doubt it.
  3. Ok, now the license option is the important part. If it's a 515E you can get more ram and thus more features going. If it's an unrestricted license, you can get more interfaces (vlan subinterfaces) going on them as well as failover to another 515. If it's the restricted, you have a limit on interfaces and ram. If it's the failover license, you can't do anything with it unless it gets connected to another 515 with an unrestricted license. "Show version" will show the license, and ram/flash amounts. Post it here if you can't decipher it. That's a pretty good model, it probably doesn't have the VAC+ card. That should occupy a PCI slot and is for offloading the encryption process from the CPU. The 515E comes with it standard, the 515 gets it as an option. Good news is you can still run the latest PIX OS on there assuming you have enough flash and ram. If you load the ASDM module on there you will have a pretty simple and full featured GUI to configure it with. There is NO homebrew options for this, Cisco would kick down the door of anyone writing software for their hardware. But honestly it will do anything you could possibly think of.
  4. Tell me the model number and I'll tell you what you can do with it.
  5. You did start the thread with this... "I'm not so interested in having access to the internet, just in identifying hosts on the network and running some potential exploits against them" If you want help running exploits against people connected to hotspots, this is not the forum for you. People here are more white than blackhat. Most of the threads that say, I want to hack my school/work/friends, don't go anywhere. We're not here to discuss that, we know how to do that and we don't really want you to. Read books, go to schools, setup test networks, do your homework. That's what we did. I was hard work and we made sacrifices. I know that you haven't done these things because you wouldn't be here asking the question if you did, you would already know. Good day sir.
  6. Isolation is the definition of absolute security. In every aspect of the word. Your money/jewels are safest in a bank that nobody can get in.. A prisoner that is highly risky is safest in solitary confinement.. A computer that has no internet connection is the best way to "protect yourself against every single type of attack". This is not always practical (obviously), so you limit as much exposure as possible, those are the best practices. Keeping a computer offline and isolated is absolutely the best way to keep it secure. I didn't say it was realistic or practical, just secure. I like to use this analogy... Teaching abstinence as a method of birth control and "safe sex". Sure it works every time, but to think everyone is going to practice that method is just narrow minded and naive.
  7. A split tunnel will give you no more security while browsing (this was the goal of the poster). The VPN compromise is this, all your traffic will route someplace trusted and completely encrypted... however ALL your traffic will route someplace trusted and completely encrypted. There is no alternative to this, this is how VPNs work by design. Use TOR or proxy servers for anonymous browsing, don't confuse anonymous with secure.
  8. this thread has been done to death, it was only a couple weeks ago, check the history.
  9. Recommending (any) Vista in a large network environment with Windows 7 less than 6 months away shows a great deal of inexperience and naivety. That is the nicest way I could phrase that and I'm doing my best to refrain from insults. :)
  10. logmein.com or any other calling-out service like PCanywhere. There's lots of em. Those services make an outbound connection that you can ride back in, very simple. My question is, are you going to leave your mobile dongle or cell phone on and attached all the time? I'm guessing your account will be promptly billed and disconnected at the end of that first day.
  11. You only have 1 private IP? that makes no sense whatsoever. You need to look up the definition of private IP ranges. You should have thousands.
  12. use route print in CMD and see which routes are preferred. Adjust the metric so the VPN network is lowest, do this while connected to the VPN, otherwise that VPN adapter will be down and not in that list. This method would be ideal since you aren't making any static routes (hosts file method). When the VPN is not available, the next metric up will be used and so on.
  13. If you configure your network properly this works pretty well. All the other pieces need to be in place for this to stay secure. For example, VLANs segregating inside and outside the firewall, lots of trunking. No service consoles in the DMZ or outside, or in the production VLAN for that matter! Strong passwords, etc. Layers! It's understandable for people to feel more comfortable with a firewall you can see and feel. Trust me, that feeling is what pays my bills, so I'm not going to shoot holes in it. If all your machines are virtual and you are comfortable in the vswitch configs, you should be fine. With that said, I don't use any, but I don't have any VMs that I face forward. At work, we use a PIX, but we have many machines that are not virtual, so it's needed. Another downfall is another single point of failure. You said you were using ESX3i, so there's no HA or vMotion there, so there's no failover. If any part of the box goes down, it's all down. :(
  14. Russix http://www.darknet.org.uk/2008/02/russix-l...g-wep-cracking/ Scripted WIFI hacking, just read the tutorials.
  15. That's the purpose of that VPN, if it doesn't start with 10.x.x.x it leaves it on the local LAN. However, the DHCP address you get via the VPN should give you a DNS IP. That should resolve IPs and show they are on the 10.x.x.x network and get your traffic to the proper place. Hard code that DNS IP as the first DNS server instead of the 3rd? What are the IPs of those network shares you are after? 10.x.x.x?
  16. If it's not a production box, just shut down the VM, copy the VMDK files (and everything else in the directory). You get a full backup pretty easy, should be easy to script that. Of course this only works if you can shut down the VMs....
  17. Awesome! Keep doing stuff until you break it, then DO IT AGAIN!! Best way to learn
  18. The reason you only see BS about this is because it is BS. If you want your traffic to look like it originated from somewhere else, it has to originate from somewhere else. If you spoof a packet with a different return address, the traffic will go to that return address. You won't be able to generate any *real* traffic. This tactic is often how DDOS attacks are performed, because the attacker has no interest in the return traffic, only the flood. There are no creative ways to change an IP or redirect other than a proxy or VPN solution. If you really plan to do something malicious with this, keep in mind, these systems can be logged and are not always as anonymous as they promise. The conversation you started truly is Networking 101, the conversation doesn't go any deep because there is nothing else to say.
  19. Run that stuff in a VM. VMware will use all the cores (or CPUs) available on supported hardware. The VM you create is then a single core CPU and don't limit the resources. The 100% of a single CPU is.... whatever resources are available to the physical box, so >1 CPU. I haven't tried that, but it sounds like it would work?
  20. It will help you because you won't be there. When they come for the pineapple, you don't have to be around or risk losing expensive equipment. Nothing to do with network security, at that point, it's physical security.
  21. Find software that is written to use multiple cores? I'm pretty sure those are old programs that are written for 32 bit OSes.
  22. Those are the max numbers with default bios. There's a bios upgrade for some of the XM models to get up to 256mb ram. My advice is go to school for it, you'll get a better education, newer books, NetAcademy login, and their equipment. Save the money on the gear and use the schools!
  23. I'm not. I was shocked he couldn't google it.
×
×
  • Create New...