lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <3587D6FDF44881459313970A8DE75A81015FF651@exchange.quadrasis.com>
From: David.Cushing at hitachisoftware.com (Cushing, David)
Subject: Comcast using IPS to protect the Internet from their home user clients?

> > Anyhow, I noticed that certain vulnerability scans, for 
> example scans
> > using Nikto and similar tools, when run from a Comcast 
> address show a
> > different behavior than when they are run from a clear, uncontrolled
> > Internet connection (i.e. corporate T-3). In fact, it appears like
> > Comcast has an Inline-IDS (some call it an IPS ;) sitting 
> on its wires,
> > filtering out certain signatures and blocking subsequent 
> access for a
> > short period of time. For example, scan progresses, then hangs
> > inexplicably, then resumes, trips a sig, and hangs again. 


Adelphia (cable modem) has also been fishy lately.  Something new in the past couple of months.





Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ