Jump to content

amikoAce

Active Members
  • Posts

    3
  • Joined

  • Last visited

Recent Profile Visitors

641 profile views

amikoAce's Achievements

Newbie

Newbie (1/14)

  1. Thanks for the info. Where would be a good place to start getting some hands-on experience with pen testing? I have programming experience in C and Python, and some knowledge of TCP-IP is this book reccomended? : BackTrack 5 Wireless Penetration Testing Beginner’s Guide
  2. Thanks for the advice :) I'm looking for a more "fingerprint" like way of separating the hosts, wihout obtaining specific information about the subnet behind the router. For example, if there was some way of determining that two TCP/IP streams originate from different machines From what I saw in the literature (e.g. the article sent by digip), there are several possibilities for inspection: 1) TTL and/or IP ID within IP Headers 2) Time information (timestamp?) within TCP Headers 3) Port numbers to see whether the source port number in TCP/UDP packets from a source reaches a high number quickly For IP-ID it's possible, for example, to plot the values received on a graph, and see how they group together - assuming consecutively-received values sent from the same host are closer to one another that values sent from different hosts What do you think about this?
  3. Hi All, I am new to this forum - I decided to join after being highly impressed with some hak5 videos I saw on youtube. My current (new) job is conducting security research in industry. My question is: - if (and how) would it be possible to assess the number of users "behind" a given NAT server? Let's assume I can record all IP traffic at the internet side of the router -- Is there any clever way to de-mulpitlex it? What would be the correct level to look at? packet? session? (There is some work on this in the literature, but I wanted to get an opinion from IT experts...) Thanks in Advance :)
×
×
  • Create New...