Vulnerability Development mailing list archives
RE: Cell phone access to email
From: John Thornton <jthornton () hackersdigest com>
Date: Wed, 22 Aug 2001 09:23:18 -0400
It is probably filtering connections to port 110 of the exchange server. I would assume that when the phone goes online it has a ip address that is just part of a subnet that is allowed to connect to the exchange server though the firewall. Either that or when the phone goes online it is being routed though a machine that exists behind the firewall. Most likely its the latter of the two. I'm sure that if you could snag the phone's ip address it could be DoS with attacks such as land, jolt, nestea, ping of death, and those types of attacks so they would want to have the phones protected behind a firewall. John Thornton - jthornton () hackersdigest com Editor in Chief Hackers Digest - www.hackersdigest.com John Thornton - jthornton () hackersdigest com Editor in Chief Hackers Digest - www.hackersdigest.com H A C K E R ' S D I G E S T ----------------------------------------------------------------- #1 for propeller heads ----------------------------------------------------------------- www.hackersdigest.com
Current thread:
- Cell phone access to email David B. Harrison (Aug 21)
- BadBlue v1.02 beta for Windows 98, ME and 2000 .php Source Code Disclosure Vulnerability acz [iSecureLabs] (Aug 22)
- Re: Cell phone access to email Fred Newtz (Aug 22)
- RE: Cell phone access to email Stephen A Santos (Aug 22)
- Re: Cell phone access to email Robert Freeman (Aug 22)
- <Possible follow-ups>
- RE: Cell phone access to email John Thornton (Aug 22)
- RE: Cell phone access to email David B. Harrison (Aug 22)
- Re: Cell phone access to email Thor (Aug 22)
- RE: Cell phone access to email David B. Harrison (Aug 26)