Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Re: [Full-disclosure] Microsoft Windows and *nix Telnet PortNumber Argument Obfuscation
From: Etaoin Shrdlu (shrdludeaddrop.org)
Date: Thu Jun 09 2005 - 10:06:19 CDT
Kristian Hermansen wrote:
> On Wed, 2005-06-08 at 15:04 +1200, Nick FitzGerald wrote:
> > This has been known since Adam was a cowboy.
He's right, you know.
> Although I don't believe that your claim is unlikely, it would have been
> nice to post a link to the original discovery to back it up.
This is just foolishness.
> that I have showed this to, personally, has not seen it before. And,
> after some google searching, I could not locate anyone else either that
> talked about this -- the closest thing was an old Microsoft telnet
> advisory that didn't mention this behavior specifically.
Link? Why would there be a "link" to show where the "original advisory"
was? You have just got to be kidding.
> With that said, I would like to ask anyone who has info about the
> original discovery to please post it here (Nick didn't respond to my
> email). I am interested to know more about it, and maybe the original
> discoverer found other things as well...thanks
Original discovery??? Don't you work for Cisco? Try either the Stevenson or
Doug Comer 3-volume set on networking. That'd probably help. I realize that
there seem to be a *whole* bunch of folk that feel that FD is a playground
and learning environment. For those of us actually looking at it as an
early warning system, think of Nick as being a vocal representative of the
majority of more senior security people on the list.
Please, if your objective is to learn about the basics, do it *elsewhere*.
The command line is useful for people who like to communicate
with their computers with a *language*, GUIs are for people
who like to to communicate by *pointing and grunting*
So who's the Neanderthal? (J. J. Green)
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/