Search:

Type: Posts; User: vityav; Keyword(s):

Search: Search took 0.00 seconds.

  1. Discussioni: Penetration Challenge

    by vityav
    Replies
    9
    Views
    2,022

    @mortis: No physical access to the server, just...

    @mortis: No physical access to the server, just to machines the professor uses (we're working on a hardware keylogger).

    @MosGuy, I understand what you mean and wish the course were more specific...
  2. Discussioni: Penetration Challenge

    by vityav
    Replies
    9
    Views
    2,022

    Privilege escalation isn't a problem. For the...

    Privilege escalation isn't a problem. For the sake of ideas, assume nothing is a problem. I'm interested in learning about this for more than just the sake of the class. The only methods of privilege...
  3. Discussioni: Penetration Challenge

    by vityav
    Replies
    9
    Views
    2,022

    Sorry, let me rephrase then. I have some...

    Sorry, let me rephrase then. I have some proprietary information stored in a private folder on a sun server. What are the most common attacks that I need to start working on defending against?
  4. Discussioni: Penetration Challenge

    by vityav
    Replies
    9
    Views
    2,022

    Penetration Challenge

    Hello all,
    So a professor of my Computer Security course, together with the campus IT director, have offered my class a challenge. They've placed a file (aptly named secret.txt) with a secret...
  5. Discussioni: MITM Detection

    by vityav
    Replies
    13
    Views
    2,916

    I'm on DHCP leasing right now but could certainly...

    I'm on DHCP leasing right now but could certainly change it to take advantage of this.



    But now you have me curious. Perhaps a clue?
  6. Discussioni: MITM Detection

    by vityav
    Replies
    13
    Views
    2,916

    I've gotten snort up with BASE, and arpwatch...

    I've gotten snort up with BASE, and arpwatch running separately. That said, this is mostly just for a small home network that nobody should be able to access, but also for public networks should I...
  7. Discussioni: MITM Detection

    by vityav
    Replies
    13
    Views
    2,916

    Arpwatch works quite well, thank you.

    Arpwatch works quite well, thank you.
  8. Discussioni: MITM Detection

    by vityav
    Replies
    13
    Views
    2,916

    I am referring to arp poisoning. I suppose what...

    I am referring to arp poisoning. I suppose what I'm going for as far as MITM is the ability to recognize things such as the gateway address changing without the connection changing (assuming you...
  9. Discussioni: MITM Detection

    by vityav
    Replies
    13
    Views
    2,916

    MITM Detection

    Hello all,
    I'm looking for opinions and advice on programs to use primarily for MITM detection. I'm running Fedora 11 and looking for a good all-around network intrustion detection system (MITM,...
  10. Discussioni: Is WPA2 broken?

    by vityav
    Replies
    6
    Views
    1,909

    Thank you all for your replies, they've given me...

    Thank you all for your replies, they've given me a lot to look into. I'm also glad to know I'm not crazy.

    @scottsee, she didn't want mac filtering because they use enough different computers and...
  11. Discussioni: Is WPA2 broken?

    by vityav
    Replies
    6
    Views
    1,909

    Is WPA2 broken?

    Hello all,
    My friend recently asked me to check out her network due to suspicions of other people stealing their bandwidth. Lo and behold, with a WPA password of "letmeinnow", the neighbors were...
Results 1 to 11 of 11