lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 28 Sep 2007 14:46:14 -0400
From: <full-disclosure@...hmail.com>
To: <staticrez@...il.com>,<simon@...soft.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: .NET REMOTING on port 31337

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Sounds like you will need to learn how to use debugging and other
reverse engineering tools dude.  Security gets a little more
complicated post-nmap.



On Fri, 28 Sep 2007 14:21:52 -0400 Simon Smith <simon@...soft.com>
wrote:
>Got output... and it was... no idea what it was... can't paste it
>due to
>confidentiality though.
>
>Fabrizio wrote:
>> .NET Remoting is "a generic system for different applications to
>use to
>> communicate with one another." It's part of the .NET framework,
>> obviously. (not trying to be a smart ass)
>>
>> I'm gonna take a wild guess and say it's not a good thing......
>>
>> Connect to it, and see if you get any output, if you haven't
>already
>> done so.
>>
>> Fabrizio
>>
>>
>>
>> On 9/28/07, * Simon Smith* <simon@...soft.com
>> <mailto:simon@...soft.com>> wrote:
>>
>>
>> Has anyone ever heard of .NET REMOTING running on port 31337? If
>so,
>> have you ever seen it "legitimate"?
>>
>>
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
><http://lists.grok.org.uk/full-disclosure-charter.html>
>Hosted and sponsored by Secunia - http://secunia.com/
>
>
>
>> -----------------------------------------------------------------
>-------
>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>
>
>--
>
>- simon
>
>----------------------
>http://www.snosoft.com
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Charset: UTF8
Version: Hush 2.5

wpwEAQECAAYFAkb9S/YACgkQ+dWaEhErNvQtSwP/ba1ktPV/2liOt6Uh9YVQBuM3aUzy
9jfdLVZv/vSqrkhK8IjCWIvMg9+uvY984mDN6MDg6VDJFalsYxP7LYdBfk6uTTUnJvY4
M6z1R+v71Rz/ZRuuG7l6Q4Mit52kIyEqf8XQSKYFsqBnqT929LbApTkdeONhkfFDNF2S
JubPYIw=
=U8Nx
-----END PGP SIGNATURE-----

--
Win the battle of the bulge with great liposuction solutions. Click now!
http://tagline.hushmail.com/fc/Ioyw6h4eJlqDWh2bfJij6EuB22WM9IcqCRWlEGl3iTYudwWgXsZIjm/


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ