lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 28 Sep 2007 15:07:34 -0400
From: Simon Smith <simon@...soft.com>
To: full-disclosure@...hmail.com
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: .NET REMOTING on port 31337

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Phew... thought you were serious for a moment...

I mean... what more could there be aside from nmap. ;]

full-disclosure@...hmail.com wrote:
> No just kidding lol a lot of people here seem to make money in this
> business.
> 
> On Fri, 28 Sep 2007 15:01:01 -0400 Simon Smith <simon@...soft.com>
> wrote:
>> No way...
> 
>> are you serious?
> 
>> ;P
> 
>> full-disclosure@...hmail.com wrote:
>>> Sounds like you will need to learn how to use debugging and
>> other
>>> reverse engineering tools dude.  Security gets a little more
>>> complicated post-nmap.
>>>
>>>
>>>
>>> On Fri, 28 Sep 2007 14:21:52 -0400 Simon Smith
>> <simon@...soft.com>
>>> wrote:
>>>> Got output... and it was... no idea what it was... can't paste
>> it
>>>> due to
>>>> confidentiality though.
>>>> Fabrizio wrote:
>>>>> .NET Remoting is "a generic system for different applications
>> to
>>>> use to
>>>>> communicate with one another." It's part of the .NET
>> framework,
>>>>> obviously. (not trying to be a smart ass)
>>>>>
>>>>> I'm gonna take a wild guess and say it's not a good
>> thing......
>>>>> Connect to it, and see if you get any output, if you haven't
>>>> already
>>>>> done so.
>>>>>
>>>>> Fabrizio
>>>>>
>>>>>
>>>>>
>>>>> On 9/28/07, * Simon Smith* <simon@...soft.com
>>>>> <mailto:simon@...soft.com>> wrote:
>>>>>
>>>>>
>>>>> Has anyone ever heard of .NET REMOTING running on port 31337?
>> If
>>>> so,
>>>>> have you ever seen it "legitimate"?
>>>>>
>>>>>
>>>> _______________________________________________
>>>> Full-Disclosure - We believe in it.
>>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>> <http://lists.grok.org.uk/full-disclosure-charter.html>
>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>
>>>
>>>>> ---------------------------------------------------------------
>> --
>>>> -------
>>>>> _______________________________________________
>>>>> Full-Disclosure - We believe in it.
>>>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>> --
>>>> - simon
>>>> ----------------------
>>>> http://www.snosoft.com
>> --
>> Click here to find great prices on contact lenses.  Save now.
>> http://tagline.hushmail.com/fc/Ioyw6h4ea3DsXjSV0BsP1YTozy3Px8JSHxZE
>> v9UYiKIbvmBMS8cN5D/
> 
> 
> 
> 
>> --
> 
>> - simon
> 
>> ----------------------
>> http://www.snosoft.com

- --
Click here for free information on exciting leadership programs.
http://tagline.hushmail.com/fc/Ioyw6h4dDEsHl9DycYqbZ3GrueBGQ2n3jOJLu8VBwDe3bXvscFUYtv/




- --

- - simon

- ----------------------
http://www.snosoft.com

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (Darwin)

iD8DBQFG/VD0f3Elv1PhzXgRAjBUAKC/7NFISUGAzV22LHAbMjx/82mCogCgo0No
8yUsbCYwx28JimfrRqEPSDs=
=CYSJ
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ