lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: caha at via.cz (Petr Cahyna)
Subject: UDP broadcast on 13364 port

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi all,
in my local network show up UDP broadcasts to the port 13364 from win2k
PC (I haven't access to this comp). I foundn only question without
reply.
http://www.it-faq.pl/news_archives/pl.comp.security/2003/aug/msg00017.html
Do You know anybody what is this .... ??

Petr

dumped packets:

E..&"S....F...........44...%...E>.............
11:27:20.147893 IP (tos 0x0, ttl 128, id 44468, offset 0, flags [none],
length: 38) 192.168.17.12.1325 > 255.255.255.255.13364: [udp sum ok]
UDP, length: 10

E..&.......^.........-44.......E>.............
11:28:04.204848 IP (tos 0x0, ttl 128, id 44846, offset 0, flags [none],
length: 38) 192.168.17.12.1329 > 255.255.255.255.13364: [udp sum ok]
UDP, length: 10

E..&.................144.......E>.............
11:38:15.506446 IP (tos 0x0, ttl 128, id 51498, offset 0, flags [none],
length: 38) 192.168.17.12.1341 > 255.255.255.255.13364: [udp sum ok]
UDP, length: 10

E..&.*...............=44.......E>.............
13:40:59.407518 IP (tos 0x0, ttl 128, id 47015, offset 0, flags [none],
length: 38) 192.168.17.12.1459 > 255.255.255.255.13364: [udp sum ok]
UDP, length: 10


where data is the same 10 bytes

00 00 b4 45 3e 82 00 05 ff fa

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFBk1gu8lYNaUvB8IgRAkLFAJ9Jofn98CnB2inISv3u7qOvuxhiQACePb08
huDIcygr5XiC85Ymwb6eOCA=
=62rz
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ