Security Basics mailing list archives
RE: FW: Legal? Road Runner proactive scanning.[Scanned]
From: "Jef Feltman" <feltman () pacbell net>
Date: Fri, 12 Mar 2004 19:22:39 -0800
So if someone comes and knocks on your door at home you shoot them? Do you consider them a criminal? No, you lock the door and windows. If your host is on the internet I consider it public and knocking on the door to see if the shop is open, is not a problem. If you do not want people coming in the door lock it and give a key to those who need it. Based on your statement no website should not be accessed by anyone other than an employee. Sending E-Mail would be a violation also, as the port must be checked to verify it can be opened to receive. Port scanning is not an attack it is probe. I have scanned many machines that have tried to attack my machine trying to verify if it is an attack or the host has been compromised. Unless the attack is currently in progress, the host is almost always taken over by a hacker or virus. Scanning the host allows me to find ports open that prove the host has been attacked and taken over. Then I am able to inform the ISP or user of the problem. And not go after some innocent user. If a company runs a service on the internet they must place a lock on the door to keep out the unwanted. Otherwise it is open to the public. Remember there are private and public ip addresses. Public means anyone can access them without freely unless they harm or steal from the host, just like the store on the corner. A port scan has never hurt any machine and never will. Only a poorly configured host will be hacked. Just as a poorly locked house will be broken into. jef I would certainly consider port scanning to be an attack, based on the intention(s) implied by such activity. Although I am far from a security expert from a technical perspective, it seems to me that the answer to this question lies not in technical arguments, but rather on determining whether one has the right to access someone else's network without permission. I, for one, believe that noone (and no organization) has the right to access my network or any systems on that network without permission. Permission to access a given resource does not necessarily have to be explicit (i.e accessing a publicly hosted web page would generally be permissible), however, ordinary concepts of reasonableness (what a reasonable person would consider ok) certainly apply (e.g. intentionally accessing an accidentally accessible resource that is clearly intended to not be accessible would be considered improper). I would view port scanning, regardless of the source, as improper access to the network. It seems to me that a reasonable person would not consider it permissible for an outside entity (e.g a business competitor) to surrepticiously attempt (the breadth and depth of the access and the resources accessed without explicit permission would help one determine whether the attempt.is indeed surrepticious) to access resources on the network. A port scan against one or more hosts by an outside agent implies an attempt to find services with potential holes active on the network. That in, and of itself, implies that the scanner will utilize any information found to launch (further) attacks against specific hosts in an attempt to gain further access to the network. As the "scanee", I can only consider such access an unwanted, unauthorized intrusion with (likely) malicious intent. As such, I would necessarily view port scans to be an attack (even if only limited) against the network. Charlie --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ----------------------------------------------------------------------------
Current thread:
- Re: FW: Legal? Road Runner proactive scanning.[Scanned], (continued)
- Re: FW: Legal? Road Runner proactive scanning.[Scanned] Derek Schaible (Mar 18)
- Re: FW: Legal? Road Runner proactive scanning.[Scanned] Bryan S. Sampsel (Mar 19)
- RE: FW: Legal? Road Runner proactive scanning.[Scanned] David Gillett (Mar 18)
- Re: FW: Legal? Road Runner proactive scanning.[Scanned] ~Kevin DavisĀ³ (Mar 18)
- Re: FW: Legal? Road Runner proactive scanning.[Scanned] Phil Brammer (Mar 19)
- Automatically encrypting and signing to a group of people w/ Outlook 2003? Mark G. Spencer (Mar 19)
- Re: Dos Attack Fernando Gont (Mar 15)
- RE: FW: Legal? Road Runner proactive scanning.[Scanned] Jef Feltman (Mar 15)
- RE: FW: Legal? Road Runner proactive scanning.[Scanned] Bryan S. Sampsel (Mar 16)
- Re: FW: Legal? Road Runner proactive scanning.[Scanned] Phil Brammer (Mar 17)
- Re: FW: Legal? Road Runner proactive scanning.[Scanned] Bryan S. Sampsel (Mar 17)