Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Re: Port-Knocking vulnerabilities?
Jan 22 2008 12:26AM
Michael Rash (mbr cipherdyne org)
On Jan 21, 2008, whip (at) netspace.net (dot) au [email concealed] wrote:
> > A server that is behind a default-drop packet filter is not
> >_practically_ detectable (say, with an nmap scan). Can you point to a
> > piece of software that can reliably perform the timing differences you
> > are referring to in order to infer th...
[ more ]
Copyright 2010, SecurityFocus