[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BAY112-F14BA41791D15EC20B794A099CD0@phx.gbl>
Date: Wed Apr 12 00:04:59 2006
From: ian.t7 at hotmail.co.uk (Ian stuart Turnbull)
Subject: Shell accounts
Thanks for your answer.
Exactly the info I was hoping to get.
Ian t
>From: "Anthony Ettinger" <aettinger@...ualumni.org>
>To: "Ian stuart Turnbull" <ian.t7@...mail.co.uk>
>CC: full-disclosure@...ts.grok.org.uk
>Subject: Re: [Full-disclosure] Shell accounts
>Date: Tue, 11 Apr 2006 15:32:12 -0700
>MIME-Version: 1.0
>Received: from uproxy.gmail.com ([66.249.92.172]) by
>bay0-pamc1-f3.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.1830); Tue,
>11 Apr 2006 15:32:13 -0700
>Received: by uproxy.gmail.com with SMTP id u2so802968uge for
><ian.t7@...mail.co.uk>; Tue, 11 Apr 2006 15:32:13 -0700 (PDT)
>Received: by 10.78.40.10 with SMTP id n10mr251821hun; Tue, 11 Apr
>2006 15:32:12 -0700 (PDT)
>Received: by 10.78.18.20 with HTTP; Tue, 11 Apr 2006 15:32:12 -0700 (PDT)
>X-Message-Info: JGTYoYF78jEHjJx36Oi8+Z3TmmkSEdPtfpLB7P/ybN8=
>DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta;
>d=gmail.com;
>h=received:message-id:date:from:sender:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references;
>
>b=RtlwS2N2FyTEDMKsM8si6NwBMSXAwMGJM716Vy1AJc6fmj/hE6CH5xghEWA6szjO1kLbH49K3oH5hPYx3pUchbwjMKUlhHVnGpGTHJ8h34ev+mjRJCnu9zsVbZESkakJM/56vkDoIm3s7h3LAspyofn+HnqPU1fh8BKTV1MivYI=
>References: <BAY112-F227EBD62579F66106468D299CD0@....gbl>
>Return-Path: ettinger@...il.com
>X-OriginalArrivalTime: 11 Apr 2006 22:32:13.0976 (UTC)
>FILETIME=[C7D68180:01C65DB7]
>
>simply having a shell account does in itself gaurantee anonymity.
>
>Whatever you read was probably talking about tunnelling. so you
>connected to target host via N number of hops (other shell accounts on
>different boxes). Doing a trace would require logs from N number of
>machines.
>
>This is more or less what the tor.eff.org network does, I believe with
>only 3 hops though + encryption between tor nodes. There are some
>give-aways though with tor, like DNS leakage which may or may not give
>you away.
>
>
>
>On 4/11/06, Ian stuart Turnbull <ian.t7@...mail.co.uk> wrote:
> > Sorry folks,
> > my inquisitiveness has got the better of me again.
> > After reading some info on hacking it refernces getting a Shell account.
> > Is this a unix type bash/bourne shell? It mentions that to remain
>anonymous
> > you will need a Shell account. I know there are a number of places
>offering
> > free shell accts some with an out to the internet others without.
> >
> > Suppose I had a friend who had a Linux connected to the internet and I
>got
> > him to set me up a username. As long as his machine didn't do any
>logging
> > [and he pretended not to know of anyone using this account] would I -
>using
> > sssh to connect] be traceable.
> >
> > No I'm not planning on doing any hacking or causing mischief. Though I'd
> > love to know who's trying to get into my machine... but thats another
> > story!!
> >
> > Ian t
> >
> > _________________________________________________________________
> > Are you using the latest version of MSN Messenger? Download MSN
>Messenger
> > 7.5 today! http://join.msn.com/messenger/overview
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> >
> >
>
>
>--
>Anthony Ettinger
>Signature: http://chovy.dyndns.org/hcard.html
_________________________________________________________________
Are you using the latest version of MSN Messenger? Download MSN Messenger
7.5 today! http://join.msn.com/messenger/overview
Powered by blists - more mailing lists