lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri Jun  2 06:26:13 2006
From: danzigfour at gmail.com (Nightfall Nightfall)
Subject: scanning

On 6/2/06, Simon Smith <simon@...soft.com> wrote:
> Guys,
>     It is not illegal to port-scan a target IP with or without
> authorization. It would be impossible to prosecute someone because they
> portscanned you. Hell, it would be near impossible to prosecute someone
> who ran nessus against you but never penetrated your systems. From
> expereince, the FBI only takes interest in crimes that cause roughly
> $50,000.00 in damage or more. If you are below that mark or if they are
> too busy... you won't get jack unless you pay for it.
>
>
>
> David Alanis wrote:
> >> Depends on the Jurisdiction... However If I found out that it was my
> >> site, I'd have to debate on whether or not to sue your ass... But that's
> >> just me...
> >>
> >
> > You would not sue anyone. Thats just saying that you would sue anyone under the sun trying to ping or go after some bot trying to scan your Apache box for IIS 5 vulnerabilities. My point is, even if you did realize someone was actively scanning your host, there would be nothing you could do, I think it would be too time consuming. Yet your question still stands. Is it legal or illegal?
> >
> > David
> >
> >
> >
> >> -----Original Message-----
> >> From: full-disclosure-bounces@...ts.grok.org.uk
> >> [mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf Of
> >> Nightfall Nightfall
> >> Sent: Thursday, June 01, 2006 7:54 PM
> >> To: full-disclosure@...ts.grok.org.uk
> >> Subject: [Full-disclosure] scanning
> >>
> >>
> >> Is it illegal if I perform a vulnerability scan on a site without
> >> permission from the owner? How about a simple port scan? thanks..
> >>
> >> _______________________________________________
> >> Full-Disclosure - We believe in it.
> >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> >> Hosted and sponsored by Secunia - http://secunia.com/
> >>
> >> _______________________________________________
> >> Full-Disclosure - We believe in it.
> >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> >> Hosted and sponsored by Secunia - http://secunia.com/
> >>
> >
> >
> >
> > "Great Spirits Have Always Encountered Violent Opposition From Mediocre Minds" - Einstein
> >
> > "Cuanta estupidez en tan poco cerebro!"
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> >
>
>
>
>
> BullGuard Anti-virus has scanned this e-mail and found it clean.
> Try BullGuard for free: www.bullguard.com
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
I brought up this topic coz of these incident
-http://www.pinoytechblog.com/archives/tridel-settles-with-inq7net-on-vulnerability-test-suit
.
I was wondering if they were justified in suing the perpetrator who
did the vulnerability scan on their network.

Powered by blists - more mailing lists