Jump to content

NewNameSamePerson

Member
  • Posts

    55
  • Joined

  • Last visited

Posts posted by NewNameSamePerson

  1. ok lets see if i got this right hamachi is a p2p file sharing program that can use windows file sharing (meaning make a direct connection like if you were sharing files/folders on a home network so you can get files instantly but what hamachi is doing is using a IP address running vpn (tunneling protocol) for security.

     

     

    right?

  2. With the advanced features enabled, Google's free toolbar for explorer phones home with every page you surf,

    and yes, it reads your cookie too. Their privacy policy confesses this, but that's only because Alexa lost a class-action lawsuit when their toolbar did the same thing, and their privacy policy failed to explain this. Worse yet, Google's toolbar updates to new versions quietly, and without asking. This means that if you have the toolbar installed, Google essentially has complete access to your hard disk every time you connect to Google (which is many times a day). Most software vendors, and even Microsoft, ask if you'd like an updated version. But not Google. Any software that updates automatically presents a massive security risk.

  3. fuckin honky

     

    the black dude on there has such a negitive attitude

     

    just like the rest of them

     

    they think sense they were inslaved 100... some years ago that they still blame us when it did not even happen to them

     

    so they walk around nit pickin every little fuckin detail that people do and think its because they are black

     

    pisses me off

     

    like the white guy kept telling him like 50 times its the way you carry yourself that makes people react to you

     

    he proved it over and over again

  4. Originally posted by -MOE LESTER-@Mar 5 2006, 03:44 AM

    I DONT KNOW HOW TO MAKE A POLE

     

     

     

    that is prolly because you need to look for the word poll

     

    it is right next to the make a thread less then a millimeter apart

     

    i cannot stand the taste of beer straight liquor

  5. you know i have to give both sides of the story

     

     

    Anti Honeypot Technology

     

    What is Anti-honeypot technology?

     

    lTools that are used to identify honeypots

     

    lFor example “Honeypot Hunter�

     

    Effects on honeypots

     

    lIf a honeypot is detected, users can attempt to bypass detection

     

    lHoneypot can be attacked if detected

     

    lThe honeypot could be used to attack other systems

     

    More effects on honeypots

     

    lPrevents honeypots from collecting valuable information

     

    lHoneypot itself loses effectiveness of being a covert system once compromised

     

    lGives attackers more characteristics to identify honeypots

     

    Characteristics of identifying honeypots

     

    lFinding honeypots is a difficult process

     

    lAttackers look for differences between a real system and a honeypot representation of a system

     

    lHoneypot systems typically limit outgoing bandwidth and the outgoing number of connections

     

    lAlters outbound packets to prevent attacks

     

    Connection Limiting

     

    lHoneypot will count the outbound connections within a period of time.

     

    lOnce the threshold is reached the new outbound connections are denied

     

    lOne of the most easiest characteristics to detect

     

    lSimply open up 10-20 websites and see if the connection is blocked

     

     

     

    Outbound packet alteration

     

    lModifies packets that are believed to be of an exploitive nature

     

    lHoneypots compute a hash of portions of the packet

     

    lReturns a response based on the hash

     

    lAttacker expects to receive a known response but instead receives a modified response from the honeypot

     

    Send-Safe Proxy Scanner

     

    lSend-Safe’s proxy scanner searches for multiple open proxy servers for obscuring a spammers identity.

     

    Honey Pot Hunter

     

    l“Send-Safe Honeypot Hunter is a tool designed for checking lists of HTTPS and SOCKS proxies for so called “honeypots�. “Honeypots� are fake proxies run by the people who are attempting to frame bulkers by using those fake proxies for logging traffic through and then send complaint’s to one’s ISPs�

    Honeypot Hunter

     

    Honeypot Hunter

     

    lThe first commercially available honeypot detection tool

     

    lHoneypot hunter tests open proxy connectivity

     

    lIt classifies the proxy as:

     

    nSafe(good)

     

    nBad(failed)

     

    nTrap(honeypot)

     

    How Honeypot Hunter works

     

    lOpens a false mail server on the local system using port 25 to test the proxy connection

     

    lHoneypot hunter attempts to proxy back to its own false mail server

     

    lThis approach identifies most invalid proxies and honeypots.

     

     

     

    Other tools

     

    lVarious noncommercial code used to identify honeypots

     

    lSebek.c , sebek-find.c , unsebek.c, vmware_detect.s

     

    lThese tools exploit vulnerabilities in popular honeypot systems like Sebek, Honeyd and VMWare

     

    Honeypot timeline

     

    l1. Honeypot

     

    l2. Honeypot Detection Tools

     

    l3. Anti Honeypot Detection tools

     

    l4. Anti Anti Honeypot Detection tools

     

    lWill the cycle ever end?

     

    Conclusions

     

    lHoneypots are a great way to observe, identify and capture potential attackers.

     

    lThe effectiveness of honeypot technology only exists if it is unknown to the attacker

     

    lHoneypot administrators must make every effort to avoid being detected (eg. Changing default error messages)

     

     

     

    Conclusions….

     

    lEssentially, the honeypot technologies must remain secret in order for them to be effective in the field.

     

    lHoneypot program writers must continually update and change their program to avoid being identified by attackers.

  6. PC Support

    Get all your Windows, Hardware, Networking, and software support questions answered here

     

    PC Tips and Tricks, Modding

     

    Linux/Unix Support

    Get all your Linux/Unix questions answered here

     

    Linux/Unix Tips and Tricks

     

    Mac Support

    Get all your mac questions answered here

     

    Mac Tips and Tricks

     

    Electronics

    Get all your questions on MP3 players, Digital Cameras, Digital Video Cameras, TV's, etc. answered here

     

    its all up to you of what you want on this thread so post your questions and suggestions

  7. l“A honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems� –whatis.com

     

    More Honeypot Definitions…

     

    l“A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.� -Lance Spitzner

     

    lHoneypots are a highly flexible security tool with different applications for security

     

    lHave multiple uses, such as prevention, detection, or information gathering.

     

     

     

    Honeypots…

     

    lHoneypots all share the same concept: a security resource that should not have any production or authorized activity.

     

    lTheoretically, a honeypot should see no traffic because it has no legitimate activity.

     

    lThis means any interaction with a honeypot is most likely unauthorized or malicious activity.

     

     

     

    Honeypot Purposes

     

    lDistract hackers from more valuable systems on the network

     

    lCan provide early warning about new attack and exploitation trends

     

    lThey allow in-depth examination of adversaries during and after exploitation

     

    lServes as an Intrusion Detection System

     

    Types of Honeypots

     

    lThere are many different types of Honeypots and can generally be broken down into two types:

     

    nLow-interaction honeypot

     

    nHigh-interaction honeypot

     

    Low-interaction honeypots

     

    lThey have limited interaction.

     

    lThey normally work by emulating services and operating systems (e.g. FTP, telnet, SMTP, UNIX, Linux)

     

    lAttacker activity is limited to the level of emulation by the honeypot

     

    lExamples of low-interaction honeypots: Spectr, Honeyd and KFSensor

     

    High-interaction honeypots

     

    lUsually complex solutions that use real operating systems and applications

     

    lNo emulation is used, the attacker sees a real system

     

    lExample: a real FTP server on a Linux system with full interaction.

     

    lAvailable tools: Symantec Decoy Server and Honeynets.

     

    Advantages of Low-interaction honeypots

     

    lSimplicity

     

    lEasier to maintain and deploy

     

    lMinimal risk, as the emulated services control what attackers can and cannot do.

     

    Disadvantages of Low-interaction honeypots

     

    lCan only log limited information

     

    lDesigned to capture known activity

     

    lEmulated services can only do so much

     

    lBecoming easier for skilled attackers to identify

     

    Advantages of High-interaction honeypots

     

    lCan capture far more information, including new tools, communications, or attacker keystrokes.

     

    lLearn about the attackers behavior and unexpected behaviors

     

    lCan do everything a low-interaction honeypot can do and more

     

    Disadvantages of high-interaction honeypots

     

    lComplex and difficult to maintain

     

    lCan use this system to attack other non honeypot systems

     

    lRequires more resources

     

    Legal Issues of Honeypots

     

    lLiability: You can potentially be held liable if your honeypot is used to attack or harm other systems or organizations. This risk is the greatest with high-interaction honeypots.

  8. if the owner is dumb enough to leave their wifi connection unsecured then they deserve to have their bandwidth stolen.

     

    more likely, like most home users, they have no idea how to apply basic, let alone decent, security to the wireless network. Yeah you can buy good and easy to use software, but few home users know that or have enough knowledge to do more than stick the CD in and let it run itself thus they even have problems getting thesoftware properly installed and set up.

     

    but be careful because if you log on to there machine it could be a honeypot if you dont know what that is. Prolly do not.

     

    go to

     

    12oz computer tech thread

    http://www.12ozprophet.com/forum/index.php...ic=69679&st=160

  9. If you've elected to upgrade all of your equipment and do not have devices on your network that do not support WPA functionality, you can set up a honeypot to distract would-be intruders if you are in an environment prone to war drivers or neighborhood snoops. A honeypot is a fake target that deters hackers from locating your real network. Take an old 802.11b access point and:

     

    1.

     

     

    Set the SSID to something different than what you are using in your new WPA capable access point or router.

     

    2.

     

     

    Use a channel at least 5 channels away from the channel you've set on the new access point or router to avoid interference.

     

    3.

     

     

    Place it near an outside window.

     

    4.

     

     

    Plug it in to a power outlet, but don't connect it to your network.

     

    5.

     

     

    Don't point any of your wireless computers or devices at this device.

     

    You've just built a honeypot. This may engage casual (but not determined) snoops and neighbors. If you live in an area that is densely populated, you may need to experiment with channel settings because you could find that there are not enough available channels to implement this.

  10. World's largest Windows error message

    error2006-02-20.jpg

     

    We went down to New York for the long weekend. Despite the 16-degree weather, we walked down to Times Square - all the bright lights lured us the ten blocks from our hotel. When we got there, we stood like, well, tourists, gaping at all the electronic billboards. And then, across the square, I saw it: the world's largest Windows error message - on a two-story high e-billboard (I guess everything really is bigger in New York). It was the only billboard in the entire square with absolutely no movement - since the PC running it had obviously frozen.

     

    error22006-02-20.jpg

     

    http://www.networkworld.com/community/?q=node/4630

×
×
  • Create New...