Penetration Testing mailing list archives

RE: FW: RE Modem identification


From: "Dawes, Rogan (ZA - Johannesburg)" <rdawes () deloitte co za>
Date: Tue, 25 Sep 2001 10:01:01 +0200

Does anyone know how Tone-LOC did automatic Parity conversion?

I started writing a War Dialler in Perl for Unix/Linux that would simply
take a list of numbers and dial them, recording the banners, and doing a bit
of prompting to stimulate banners if none were forthcoming. But one of the
things that I have no idea how to do is the "Automatic Parity conversion"
that Tone-LOC did, when connecting to a different parity modem.

Does anyone have any ideas?

Re the prompting, one of the most common "Silent" modems seems to be Windows
NT RAS. This sits there until you give it a particular string.  I am
intending to capture the initial string using PortMon, and replay it blindly
whenever I get no initial characters. That should help identify a number of
systems, I think.

Rogan

-----Original Message-----
From: Bikar Dude [mailto:bika () nuclear biodome org]
Sent: 23 September 2001 12:18
To: Stephan Barnes
Cc: 'pen-test () securityfocus com'
Subject: Re: FW: RE Modem identification


//* ObHacker: Pick any 6 unix utilities and write a complete war-dialer.
ObHacker++: Try to reduce the total number of letters in the 6 commands to
less than 20. *//

-b


----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: