lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: security at centrodiascolto.it (Paolo Mattiangeli)
Subject: OT microsoft "feature"

010 translating into 8... it reminds to me something like octal format,
isn't it? ;)

p.

----- Original Message ----- 
From: "Davide Del Vecchio" <dante@...ghieri.org>
To: <full-disclosure@...ts.netsys.com>
Sent: Friday, April 16, 2004 3:14 PM
Subject: [Full-Disclosure] OT microsoft "feature"


> Hi list,
>
> I`m sorry for the OT,
> Anyone has a good explaination for this ?
>
> Windows XP Professional SP1
>
> C:\>ping 10.10.10.10
>
> Esecuzione di Ping 10.10.10.10 con 32 byte di dati:
>
> Control-C
> ^C
> C:\>ping 010.10.10.10
>
> Esecuzione di Ping 010.10.10.10 [8.10.10.10] con 32 byte di dati:
>
> Control-C
> ^C
> C:\>ping 010.010.10.10
>
> Esecuzione di Ping 010.010.10.10 [8.8.10.10] con 32 byte di dati:
>
> Control-C
> ^C
> C:\>ping 010.010.010.10
>
> Esecuzione di Ping 010.010.010.10 [8.8.8.10] con 32 byte di dati:
>
> Control-C
> ^C
> C:\>ping 010.010.010.010
>
> Esecuzione di Ping 010.010.010.010 [8.8.8.8] con 32 byte di dati:
>
> Control-C
> ^C
> C:\>
>
> Obviously if you try the same thing on a *NIX or IOS the "0" is
> just ignored.
> It seems like the 0 character implies a modification in the IP field..
> It`s not a bug of the "ping" command, because it "works" on telnet, ftp...
>
> d.
>
>  - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040416/488cfa0c/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ