Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
RE: Port-Knocking vulnerabilities?
Jan 21 2008 11:22AM
whip netspace net au
> A server that is behind a default-drop packet filter is not
>_practically_ detectable (say, with an nmap scan). Can you point to a
> piece of software that can reliably perform the timing differences you
> are referring to in order to infer that a server is really listening
> behind such a packet...
[ more ]
Copyright 2010, SecurityFocus