lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 28 Sep 2007 15:20:13 -0400
From: <full-disclosure@...hmail.com>
To: <simon@...soft.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: .NET REMOTING on port 31337

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

dunno how do you plan on figuring out what is running there

On Fri, 28 Sep 2007 15:07:34 -0400 Simon Smith <simon@...soft.com>
wrote:
>Phew... thought you were serious for a moment...
>
>I mean... what more could there be aside from nmap. ;]
>
>full-disclosure@...hmail.com wrote:
>> No just kidding lol a lot of people here seem to make money in
>this
>> business.
>>
>> On Fri, 28 Sep 2007 15:01:01 -0400 Simon Smith
><simon@...soft.com>
>> wrote:
>>> No way...
>>
>>> are you serious?
>>
>>> ;P
>>
>>> full-disclosure@...hmail.com wrote:
>>>> Sounds like you will need to learn how to use debugging and
>>> other
>>>> reverse engineering tools dude.  Security gets a little more
>>>> complicated post-nmap.
>>>>
>>>>
>>>>
>>>> On Fri, 28 Sep 2007 14:21:52 -0400 Simon Smith
>>> <simon@...soft.com>
>>>> wrote:
>>>>> Got output... and it was... no idea what it was... can't
>paste
>>> it
>>>>> due to
>>>>> confidentiality though.
>>>>> Fabrizio wrote:
>>>>>> .NET Remoting is "a generic system for different
>applications
>>> to
>>>>> use to
>>>>>> communicate with one another." It's part of the .NET
>>> framework,
>>>>>> obviously. (not trying to be a smart ass)
>>>>>>
>>>>>> I'm gonna take a wild guess and say it's not a good
>>> thing......
>>>>>> Connect to it, and see if you get any output, if you haven't
>>>>> already
>>>>>> done so.
>>>>>>
>>>>>> Fabrizio
>>>>>>
>>>>>>
>>>>>>
>>>>>> On 9/28/07, * Simon Smith* <simon@...soft.com
>>>>>> <mailto:simon@...soft.com>> wrote:
>>>>>>
>>>>>>
>>>>>> Has anyone ever heard of .NET REMOTING running on port
>31337?
>>> If
>>>>> so,
>>>>>> have you ever seen it "legitimate"?
>>>>>>
>>>>>>
>>>>> _______________________________________________
>>>>> Full-Disclosure - We believe in it.
>>>>> Charter: http://lists.grok.org.uk/full-disclosure-
>charter.html
>>>>> <http://lists.grok.org.uk/full-disclosure-charter.html>
>>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>>
>>>>
>>>>>> -------------------------------------------------------------
>--
>>> --
>>>>> -------
>>>>>> _______________________________________________
>>>>>> Full-Disclosure - We believe in it.
>>>>>> Charter: http://lists.grok.org.uk/full-disclosure-
>charter.html
>>>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>>> --
>>>>> - simon
>>>>> ----------------------
>>>>> http://www.snosoft.com
>>> --
>>> Click here to find great prices on contact lenses.  Save now.
>>>
>http://tagline.hushmail.com/fc/Ioyw6h4ea3DsXjSV0BsP1YTozy3Px8JSHxZE
>
>>> v9UYiKIbvmBMS8cN5D/
>>
>>
>>
>>
>>> --
>>
>>> - simon
>>
>>> ----------------------
>>> http://www.snosoft.com
>
>--
>Click here for free information on exciting leadership programs.
>http://tagline.hushmail.com/fc/Ioyw6h4dDEsHl9DycYqbZ3GrueBGQ2n3jOJL
>u8VBwDe3bXvscFUYtv/
>
>
>
>
>--
>
>- simon
>
>----------------------
>http://www.snosoft.com
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Charset: UTF8
Version: Hush 2.5

wpwEAQECAAYFAkb9U+0ACgkQ+dWaEhErNvTN/gP+OAbBwOn6HOkYPVvt6KLuKVgBDfPb
8wrnTokE1nbLmWcDjhPK74czzUraavWa8HGAIAF3JhhkvOO8M1VtrqNxbqij4DbYzXgQ
+TSbmOD2KPd2d8FKk2pqdNBjyx6cgIdwhqOYbJ98J7qd15cDhPde8BMpaSDTUW2nHiIA
UaXHYWQ=
=6LI4
-----END PGP SIGNATURE-----

--
Click here for self-employed health insurance.  Compare quotes!
http://tagline.hushmail.com/fc/Ioyw6h4dO2Z8cZsdkRcrJPaDqHHJS0ocJrdGZVPi0BpPmlOko6JrPy/


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ