Re: wireless security
- From: Sebastian Gottschalk <seppi@xxxxxxxxx>
- Date: Tue, 27 Jun 2006 02:31:29 +0200
Mark Wake wrote:
and or you can enable the mac locking
That helps until someone legitimate creates a connection. Sniffing just
one packet is enough and you know a valid MAC address.
- Re: peer to peer messaging
... attempts to open a connection to port 80 of the server at that IP address. ... For example a packet from my machine might have source IP ... Packets from the sever to my laptop would have those reversed. ...
- Re: IPFW Dynamic Rules
... > So if the dynamic rule has the same behaviour as the origination ... > rule on the same port with the same protocol, ... If client sends UDP query to DNS on your machine, you get the packet: ... is deleted after connection is inactive for some time. ...
- [NEWS] Cisco PIX TCP Connection DoS
... Get your security news from a reliable source. ... By crafting a special TCP packet and sending it to a vulnerable Cisco PIX, ... embryonic connection open until the embryonic connection timeout which is ...
- Re: Nmap questions concering my router
... that may have to be fetched) is downloaded as one connection. ... >> all addresses (and may listen using just one interface to receive all ... sends packets to the correct protocol driver ... wire to an IP packet, and hands this to the IP driver which strips off ...
- Re: Port "triggering"
... The reason you should specify the -d above is if you have two internal nets ... If you are connecting to some outside server your connection will never make ... Again, the rule you had takes every single packet going to port 3783, no ... At the end of each chain I do a: ...