PaulDotCom mailing list archives

P2P Pentesting


From: Russell.Butturini at Healthways.com (Butturini, Russell)
Date: Thu, 8 Oct 2009 08:57:52 -0500

I'm covering a good bit of this in my presentation for PhreakNIC this year as well.  Happy to share any info with you 
that you need.

----- Original Message -----
From: pauldotcom-bounces at mail.pauldotcom.com <pauldotcom-bounces at mail.pauldotcom.com>
To: pauldotcom at mail.pauldotcom.com <pauldotcom at mail.pauldotcom.com>
Sent: Thu Oct 08 07:42:17 2009
Subject: [Pauldotcom] P2P Pentesting

Back in show 154, there was a great presentation on using P2P to discover information.  One of the guys made a comment 
about using P2P during penetration testing and audits to discover information leakage.  I am wondering what P2P clients 
are capable of displaying the source IP address of the client sharing files or more importantly, how I can do a P2P 
search for any files coming from a particular source IP address/range?

 

I have three class C blocks of public IP addresses that I would like to determine whether any are being used to share 
files.  

 

Thanks.

 

Brian

This message (including any attachments) may contain confidential information and is intended only for the individual 
to which it is addressed. If you are not the intended recipient, please delete this message and contact the sender. You 
are also hereby notified that any review, disclosure, copying, or distribution of this message, or the taking of any 
action based on it, is prohibited.

******************************************************************************
This email contains confidential and proprietary information and is not to be used or disclosed to anyone other than 
the named recipient of this email, 
and is to be used only for the intended purpose of this communication.
******************************************************************************
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.pauldotcom.com/pipermail/pauldotcom/attachments/20091008/23d39742/attachment.htm 


Current thread: