lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <Pine.LNX.4.58.0403261124040.8481@catbert.rellim.com> From: gem at rellim.com (Gary E. Miller) Subject: Reverse flow RPC? -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Yo Daniel! On Fri, 26 Mar 2004, Daniel H. Renner wrote: > I took a look-see at my firewall log for yesterday and saw four > instances of what appears to be reversed incoming RPC traffic on the Red > (WAN/eth2) side. Probably a stealth scan. NMAP has several ways to do this. Grab a copy and read the it's doc on Stealth FIN, Xmas Tree and Null scan moeds (-sF, -sX, -sN). These are a great way to scan past non-stateful firewalls. RGDS GARY - --------------------------------------------------------------------------- Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701 gem@...lim.com Tel:+1(541)382-8588 Fax: +1(541)382-8676 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQFAZIPv8KZibdeR3qURArFLAKCYm5Sg9R9q2bBp/q6hDPyxh23kSgCgtpvt KCXACsRAN8LnTGGHqRJOnGI= =SHr3 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists