Vulnerability Development mailing list archives

Re: SSH 3.1.0 Potential Exploit + FIX


From: <sekure () hadrion com br>
Date: Fri, 15 Mar 2002 15:33:26 -0300

Hi,

I'm "walking" by the internet finding about paper/techniques that can be
used to detect systemn with IDS installed. Try to detect
snort/snort+aide/quinds/.../ somebody know something like it ??

And "how to outline a firewall" ... techinique to try bypass rules of a
firewall ... or dribble ? Maybe wrong common mistakes in configurations ....

Thkz for all.

Cheers.

[ ]'s


Current thread: