Vulnerability Development mailing list archives

Re: Synaptics TouchPad, strange packets.


From: Jason Kohles <jkohles () redhat com>
Date: Wed, 28 Nov 2001 10:29:42 -0600

On Wed, Nov 28, 2001 at 12:52:18AM -0600, Anthony Kim wrote:
On Tue, Nov 27, 2001, Valerio B. wrote:

[snip]
Binary dump of the packet:
0000:  xx xx xx xx xx xx xx xx : xx xx xx xx 08 00 45 00 |  SRC..DEST....E.
0010:  00 32 9D D3 00 45 80 11 : EB F8 D4 0F A2 F0 C1 A6 | .2...E..........
0020:  78 03 45 21 FF 00 96 6D : F9 52 B9 57 29 C8 0A B9 | x.E!...m.R.W)...
0030:  04 60 E6 99 54 48 B4 1A : 00 4A 28 03 FF D9 FF FF | .`..TH...J(.....
******************************************

Just an FYI. You xx'd out the Ethernet addresses but left the IP
addresses in the hex dump. 212.15.162.240 is your source IP
and your destination 193.166.120.3. If you make the effort, might
as well go the last mile.

With regard to Synoptics Touchpad, how did you come to the determination
this was the source of your packets?

And are you running cu-seeme?  193.166.120.3 is zippo.uwasa.fi, a cu-seeme
reflector: http://www.uwasa.fi/zippo/

-- 
Jason Kohles                                 jkohles () redhat com
Senior System Architect                      (703)786-8036 (cellular)
Red Hat Professional Consulting              (703)456-2940 (office)


Current thread: