Jump to content

decepticon_eazy_e

Active Members
  • Posts

    164
  • Joined

  • Last visited

Posts posted by decepticon_eazy_e

  1. Has anyone run a SmarterMail server or had to maintain one? I have a client with this and I need to be able to lock it down and find all the holes. I've googled and checked Milworm, and I haven't found any exploits in the latest version. Does anyone have any inside information on this thing?

    Specifically... Smartermail Enterprise 5.5 on Windows Ser 2003.

    I'm looking for holes from the outside if there are any, I want to be able to say this is locked down... ya know!

  2. I am looking at putting ESXi on my server and was wondering if I were to also move Vista Home Premium to it would it be able to access and use the TV card as its currently running headless anyway.

    I dont access Vista Media Center direct its only through extenders and its not mission critical.

    Thanks

    Is the tv card on vmware's HAL list? I doubt it.

  3. It'S a Cisco PIX-515

    ;)

    Ok, now the license option is the important part. If it's a 515E you can get more ram and thus more features going. If it's an unrestricted license, you can get more interfaces (vlan subinterfaces) going on them as well as failover to another 515. If it's the restricted, you have a limit on interfaces and ram. If it's the failover license, you can't do anything with it unless it gets connected to another 515 with an unrestricted license.

    "Show version" will show the license, and ram/flash amounts. Post it here if you can't decipher it.

    That's a pretty good model, it probably doesn't have the VAC+ card. That should occupy a PCI slot and is for offloading the encryption process from the CPU. The 515E comes with it standard, the 515 gets it as an option.

    Good news is you can still run the latest PIX OS on there assuming you have enough flash and ram. If you load the ASDM module on there you will have a pretty simple and full featured GUI to configure it with.

    There is NO homebrew options for this, Cisco would kick down the door of anyone writing software for their hardware. But honestly it will do anything you could possibly think of.

  4. I've got an old Pix firewall lying around at home,

    any posibilities of flashing it with new OS or something?

    I want to set up a firewall anyways for a DMZ,

    think the PIX will do a fine job there,

    but maybe there's more stuff or better homebrew software for it.

    If anyone's got any info pls share. Thx

    Tell me the model number and I'll tell you what you can do with it.

  5. I just think that all of you are getting a little carried away with the "what ifs." What if a nuclear bomb hits the U.S. right now? We would all be dead. Is it likely to occur, even given the state of world security? No. The chances of a nuclear explosion happening without any warning are still very slim. What if I get arrested for mapping out poor, innocent Barnes and Noble's hotspot? I might spend the night in jail, or they might have a little talk with me and send me on my way. Is it even likely that they would care about me mapping their fucking network? The manager at the book store probably wouldn't even know what the hell that means let alone care. I want to poke around a book store hotspot big freakin deal, are you all seriously gonna play the card of "oh well technically under article blah blah blah of this law that particular action is illegal?" Did you know that that "[in Utah] adultery, oral and anal sex, and masturbation are considered sodomy and can lead to imprisonment. " So if I lived in Utah and you caught me masturbating are you seriously gonna call the cops on me?

    You did start the thread with this...

    "I'm not so interested in having access to the internet, just in identifying hosts on the network and running some potential exploits against them"

    If you want help running exploits against people connected to hotspots, this is not the forum for you. People here are more white than blackhat. Most of the threads that say, I want to hack my school/work/friends, don't go anywhere. We're not here to discuss that, we know how to do that and we don't really want you to. Read books, go to schools, setup test networks, do your homework. That's what we did. I was hard work and we made sacrifices. I know that you haven't done these things because you wouldn't be here asking the question if you did, you would already know.

    Good day sir.

  6. Since when does the definition of security entail complete and utter isolation from all other connected systems? It's about setting up the best practices to keep what you don't want out and allowing access for what you do want. You're trying to sound all philosophical and it didn't work. Although I know what you're talking about, in fact I don't know where I heard it (mentioned somewhere in 2600 I believe), but the article said the most secure system is the one a thousand feet underground, not connected to anything, encased in a foot of concrete. The system doesn't do you much good since you have no ability to access it.

    Apply best practices to keep your network safe and remember there is no way to protect yourself against every single type of attack, it's not worth the effort especially when you're just talking about network security because it's not worth losing (exorbitant) amounts of sleep over. If someone is so totally dedicated about breaking into my home network and spends days, maybe even weeks planning an attack...I would be quite flattered that they think my data is that damn important.

    Isolation is the definition of absolute security. In every aspect of the word. Your money/jewels are safest in a bank that nobody can get in.. A prisoner that is highly risky is safest in solitary confinement.. A computer that has no internet connection is the best way to "protect yourself against every single type of attack".

    This is not always practical (obviously), so you limit as much exposure as possible, those are the best practices. Keeping a computer offline and isolated is absolutely the best way to keep it secure.

    I didn't say it was realistic or practical, just secure. I like to use this analogy... Teaching abstinence as a method of birth control and "safe sex". Sure it works every time, but to think everyone is going to practice that method is just narrow minded and naive.

  7. Set it up as a split tunnel. That way all your internet traffic will go out your normal network connection and only your local network traffic will go over the tunnel.

    A split tunnel will give you no more security while browsing (this was the goal of the poster).

    The VPN compromise is this, all your traffic will route someplace trusted and completely encrypted... however ALL your traffic will route someplace trusted and completely encrypted. There is no alternative to this, this is how VPNs work by design.

    Use TOR or proxy servers for anonymous browsing, don't confuse anonymous with secure.

  8. Unless there is a vulnerability in a particulate system that acts upon other wise non-executable files, then there is no way to use non-executable files to install or run stuff. The majority of file types that do allow code execution (exe, msi, bat, com, dll, lnk) are blocked by most email services.

    this thread has been done to death, it was only a couple weeks ago, check the history.

  9. I'd like to go 64bit, to Vista Home Premium 64. The cost is what's wrong with it.

    Recommending (any) Vista in a large network environment with Windows 7 less than 6 months away shows a great deal of inexperience and naivety. That is the nicest way I could phrase that and I'm doing my best to refrain from insults. :)

  10. I haven't got a landline at my house, so I connect my home computer to the internet via a cellphone or a mobile broadband dongle. I'd like to be able to connect to the machine when I'm out and about. I've got apache on the machine, so I got a DynDNS account and used my eeepc to see if I could view a test webpage I put on the home computer. It didn't work - all I got was a blank page.

    I did some reading on the subject and learned that internet-connected phones and computers on a cellphone provider's network are behind a firewall that will only allow connections that are initiated from behind the firewall. Simply put, I can make a connection from my home computer out to another machine on the int.ernet, but I cannot make a connection from that other machine to my home computer.

    I've been thinking about how I can get around this restriction. One idea I had was to send an email to my home computer with a special subject line that procmail would see and grab, and have some kind of commands in the body of the email that would tell the machine to connect to me. So the connection would be initiated by the computer behind the firewall. But I haven't really explored that idea because I don't know what I'm talking about.

    I'm not really fussed about making my home computer available to other people. I want to be able to access it myself. I started thinking about all this after seeing that Hak5 segment about using DNS requests to get free internet access at cyber cafes whose systems allow DNS requests to go through. Hmm, that's worded pretty badly. I hope you know what I'm talking about?

    Anyway, has anyone got any thoughts on how I might achieve this?

    EDIT: I forgot to mention, my home computer is running Ubuntu Hardy, and my eee uses eeebuntu Jaunty. If that's at all important.

    logmein.com or any other calling-out service like PCanywhere. There's lots of em. Those services make an outbound connection that you can ride back in, very simple.

    My question is, are you going to leave your mobile dongle or cell phone on and attached all the time? I'm guessing your account will be promptly billed and disconnected at the end of that first day.

  11. The thing is i only have one private IP, so i guess i could only use one VM on that IP?

    You only have 1 private IP? that makes no sense whatsoever. You need to look up the definition of private IP ranges. You should have thousands.

  12. Correct, the shares that I can't browse to via hostname are on the 10.x.x.x network, aka my work network.

    Switching the DNS is not going to do me much good, as since its going to be bound to the 192.168.x.x network, I'll need to route to get to a 10.x.x.x DNS server, which requires me to go through the VPN.

    Which, of course, we're already doing.

    I think the way to get this fixed is by finding a way to specify that any DNS that cant be found should be searched on all the routing tables, if not found there search the DNS server, failing that go to the NEXT interface. That of course becomes a time out issue, since I have 2 NICs, 2 VM Interfaces, 2 Firewire Interfaces, and then the VPN interface.

    This is quickly seeming that doing a hosts file is the way to go, lol.

    -B

    use route print in CMD and see which routes are preferred. Adjust the metric so the VPN network is lowest, do this while connected to the VPN, otherwise that VPN adapter will be down and not in that list.

    This method would be ideal since you aren't making any static routes (hosts file method). When the VPN is not available, the next metric up will be used and so on.

  13. I still have problems with firewalls being in virtual machines. It just gives me that "ehhhh" feeling in my stomach. In my opinion(which we all know the saying about opinions) it's better to have the firewall as a separate machine on the network. It doesn't really need that much in hardware specs. Mini-itx, or an old laptop would work pretty good for a basic low power firewall.

    If you configure your network properly this works pretty well. All the other pieces need to be in place for this to stay secure. For example, VLANs segregating inside and outside the firewall, lots of trunking. No service consoles in the DMZ or outside, or in the production VLAN for that matter! Strong passwords, etc.

    Layers!

    It's understandable for people to feel more comfortable with a firewall you can see and feel. Trust me, that feeling is what pays my bills, so I'm not going to shoot holes in it. If all your machines are virtual and you are comfortable in the vswitch configs, you should be fine. With that said, I don't use any, but I don't have any VMs that I face forward. At work, we use a PIX, but we have many machines that are not virtual, so it's needed. Another downfall is another single point of failure. You said you were using ESX3i, so there's no HA or vMotion there, so there's no failover. If any part of the box goes down, it's all down. :(

  14. I would do that, however I'm only periodically attached to the VPN, using it mainly to look at network shares, etc.

    I thought for sure that adding our internal DNS server (.25) as 3rd on my list of the DNS servers for my primary NIC would work, but it hasn't. I guess that doesn't make sense, because my primary NIC is on a 192.168 network, and the other network is 10.7 network.

    My Virtual VPN NIC has the correct DNS server, I think I'm just going to have to hard code in the locations I'm looking for, because unless the IP starts with 10.x.x.x, DNS will assume that its on the 192.168.x.x network, unless anyone knows a way to force queries across all defined DNS servers?

    Thanks,

    -B

    That's the purpose of that VPN, if it doesn't start with 10.x.x.x it leaves it on the local LAN. However, the DHCP address you get via the VPN should give you a DNS IP. That should resolve IPs and show they are on the 10.x.x.x network and get your traffic to the proper place. Hard code that DNS IP as the first DNS server instead of the 3rd?

    What are the IPs of those network shares you are after? 10.x.x.x?

  15. http://communities.vmware.com/docs/DOC-8760

    GhettoVCB.sh

    You can setup NFS on Server 2003 quite easily using Windows Services for UNIX 3.5 and Server 2008 supports NFS out of the box.

    If it's not a production box, just shut down the VM, copy the VMDK files (and everything else in the directory). You get a full backup pretty easy, should be easy to script that.

    Of course this only works if you can shut down the VMs....

  16. Ok. As a start, I am posting this from my new Kubuntu dual boot. Everything is surprisingly shiny...

    Awesome! Keep doing stuff until you break it, then DO IT AGAIN!! Best way to learn

  17. Actually some of us in here would be a target by local, state and/or federal police from past mistakes or current connections.

    The reason for my post and others that I post like it aren't for collecting answers for a noob, I'm trying to spark conversation on here and get people talking. I hate seeing the same BS stuff on forums after forums. If someone has a creative and different way to change an IP or redirect it, I want to know and share.

    The reason you only see BS about this is because it is BS. If you want your traffic to look like it originated from somewhere else, it has to originate from somewhere else. If you spoof a packet with a different return address, the traffic will go to that return address. You won't be able to generate any *real* traffic. This tactic is often how DDOS attacks are performed, because the attacker has no interest in the return traffic, only the flood.

    There are no creative ways to change an IP or redirect other than a proxy or VPN solution. If you really plan to do something malicious with this, keep in mind, these systems can be logged and are not always as anonymous as they promise.

    The conversation you started truly is Networking 101, the conversation doesn't go any deep because there is nothing else to say.

  18. I still don't see how the pineapple is going to help you. Any company that's going to spend the cash for one of these most likely has some pretty nice traffic analysis hardware installed. They'll have already snarfed any user names and passwords you've been using.

    It will help you because you won't be there. When they come for the pineapple, you don't have to be around or risk losing expensive equipment.

    Nothing to do with network security, at that point, it's physical security.

  19. Hey guys,

    I have a vista machine that has some pretty beefy specs. I believe its a quad core. Now i was running Cain doing a bruteforce attack on an NTLM hash. When i watch the Vista processes. CPU is at 25%. I start up John the Ripper and start cracking it aswell. Look at the processes, and JTR is at 25% and Cain is at 25%.

    I want to use as much processing power as possible. Not being limited to 25% per process. Is this a thing with Vista just using each core for each process or whats happening? I'm not savvy with how Vista handles business. And i've never used any of these apps on a quad core so i am pretty clueless. Has anyone got some insight?

    Cheers.

    Find software that is written to use multiple cores? I'm pretty sure those are old programs that are written for 32 bit OSes.

  20. Ok, I am new to Linux and am useing Ubuntu Jaunty 9.04.

    I would like to learn how to use the CLI better.. can anyone help me out with what the command is to do these tasks? quick linux quiz!

    - How do I view the user list of created user accounts and passwords on my system.. I know i can type "who" to see whos on my pc at that moment, but would like to see all the user accounts listed.

    - what is the password. file for? user accounts on my linux pc? where is it ussually located?

    - what exactly is the cat command good for? i have googled and get mixed stuff

    - how do i empty my temporary files, or clean the cache (stuff simular to useing ccleaner in windows)

    - how do i update chkrootkit? i know since i installed it 2 weeks ago their has to be a way to update it right? simular to AVG or Avast antovirus updates? or even Clam AV, is that worth installing? and after installed how do i update stuff from the terminal screen, sudo apt-get update "program"?

    Im positive just by these questions you can tell im new to linux from windows, any help is appriciated. Thanks

    Sounds like somebody's homework

  21. at least one 2621xm w/ (correct me if Im wrong on this) 64mb/128mb (ram and flash)

    Those are the max numbers with default bios. There's a bios upgrade for some of the XM models to get up to 256mb ram.

    My advice is go to school for it, you'll get a better education, newer books, NetAcademy login, and their equipment. Save the money on the gear and use the schools!

×
×
  • Create New...