lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <E9E825290C77D34FB9E967311964C3324B0A3D@EXCH1.corp.iovation.com> Date: Fri, 25 Mar 2005 12:34:51 -0800 From: "Bruce Klein" <bruce.klein@...ation.com> To: "Erwan Arzur" <erwan@....epita.fr>, <bugtraq@...urityfocus.com> Subject: RE: TCP timestamp & advanced fingerprinting How does this compare with [Prs2002] Clock Deviation/Skew as a Forensics/Tracking Tool research done by Tadayoshi Kohno. http://www.cse.ucsd.edu/users/tkohno/ Bruce Klein iovation, Inc. -----Original Message----- From: Erwan Arzur [mailto:erwan@....epita.fr] Sent: Friday, March 25, 2005 6:05 AM To: bugtraq@...urityfocus.com Subject: TCP timestamp & advanced fingerprinting -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, attached is a paper from one of our students about using the TCP timestamps in TCP headers as a fingerprinting tip, which can ultimately be used for mapping networks behind firewalls. Erwan Arzur EPITA/EPITECH systems Laboratory http://www.lse.epita.fr/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (FreeBSD) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCRBp5tchshDF9KNYRApEaAJ9Cx+AfvdFyHMll4nBo3ZCrPRzK8ACfasSP Wkx5F+xTG9+BGD/wmWFeOBM= =2T62 -----END PGP SIGNATURE----- The information contained in this email message may be privileged, confidential and protected from disclosure. If you are not the intended recipient, any dissemination, distribution or copying is strictly prohibited. If you think that you have received this email message in error, please notify the sender by reply email and delete the message and any attachments.
Powered by blists - more mailing lists