The Reverse Challenge: Winners Announced 186
asqui writes: "The Reverse Challenge was a contest from The Honeynet Project to essentially reverse engineer a binary captured in the wild running on a compromised honeypot. The contest ran during May of this year and the submissions have been judged and the winners announced. Dion Mendel took first place with 43.4 points out of a possible 50. The binary turned out to be a tool for performing remote DoS attacks from compromised hosts, with its instructions being cunningly supplied via the lesser known IP protocol 11. This binary is currently being used in the wild but there is little reported activity, probably because sysadmins are focused on the other more dominant protocols."
d'oh! (Score:1, Troll)
You have just caused an evil-grin to appear on the faces of many trojan writers. They now have another 'cunning' trick to add to their arsenal.
Let's hope so. (Score:2, Insightful)
Re:Let's hope so. (Score:1)
achtung! (Score:2, Funny)
Re:achtung! (Score:4, Funny)
EULA: By allowing your system to be compromised by this program you hereby agree to the following license conditions...
the prize... (Score:1)
Fascinating (Score:5, Informative)
Hopefully they will be doing a similar contest again next year. In the meantime, I guess we'll just have the Scan of the Month to analyse.
a smart Sysadmin (Score:1, Troll)
Of course without these slashdot.org posts I would be out of a job..so I guess hey bring on more slashdot.org posts!
Have you forgotten the old masters Grasshopper? (Score:3, Insightful)
From The Art Of War by Sun Tzu:
"The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not
on the chance of his not attacking, but rather on the fact that we have
made our position unassailable."
So a sysadmin relying on the attackers inability is if fact the irresponible one! neener neener
Re:Have you forgotten the old masters Grasshopper? (Score:1)
Re:Have you forgotten the old masters Grasshopper? (Score:1)
I should have asked before the contest but (Score:5, Insightful)
If this was the case then reverse engineering it might be pretty straight forward.
Just wonder, not accusation made.
Re:I should have asked before the contest but (Score:1)
Re:I should have asked before the contest but (Score:1)
this one goes to eleven (Score:2, Insightful)
*checks /etc/protocols* What the hell is protocol 11?
Do routers even route protocol 11? Would it make it to its DoS destination? Interesting. Per usual slashdot behaviour, I haven't read the articles yet, but I hope they discuss this a little more.
Hmm.......
Re:this one goes to eleven (Score:2, Informative)
See rfc741 [faqs.org]
Re:this one goes to eleven (Score:1, Informative)
http://www.iana.org/assignments/protocol-number
Re:this one goes to eleven (Score:2, Funny)
Re:this one goes to eleven (Score:3, Funny)
Mu.
Normal routers don't care what protocol is being used. They route at the IP layer. ICMP, TCP, UDP, and "Protocol 11" are all layered on top of the IP layer.
Now, a firewall is a different story...
The article summary was misleading (Score:1)
Re:The article summary was misleading (Score:1)
The protocol field is stored in the IP header, not the TCP or UDP header. IP protocol number 11 is correct here, just as IP protocol number 17 is UDP.
Yes. (Score:2)
Have a look at
It's just something you don't usually hear about because we tend to only use TCP, UDP, and ICMP, and maybe GRE. (protocols 6, 17,1,and 47, respectively).
You can generate IP packets of whatever protocol ID you want and routers SHOULD route them.
Bad joke (Score:1)
Reverse-Engineering Their HTML (Score:2, Funny)
The results link posted above (http://project.honeynet.org/reverse/results/) is wonderfully tortured HTML ... with
the pleasing side-effect of triggering
a mouseover color change for over half
the text in the opening paragraph when
rendered with Mozilla.
Hey, I found it interesting...
Re:Reverse-Engineering Their HTML (Score:1)
*buzz*
Looks like a simple icky HTML error. Tsk Tsk. They should be more careful.
-Sara
Re:Reverse-Engineering Their HTML (Score:1)
Interesting? People don't close tags ...
Tsk Tsk. They should be more careful.
Yeah, tell me [w3.org] about it [w3.org]. (I apologize for selecting a DTD for you.)
You get your own *buzz* now.
Maybe I ought to have stated that I find it interesting (still) that obvious markup errors persist when several diagnostic and corrective tools exist. Somehow, I think that point would be lost on you. :p
Signed,
Puzzled over Neuroticia [slashdot.org]'s death [archive.org] and apparent rebirth [slashdot.org].
Re:Reverse-Engineering Their HTML (Score:1)
I also think it's safer to say that a page that is targetting people of an unknown browser type in an anal retentive geek community needs to be more strict about their HTML than a 19 year old girl who is writing stupid things for a variety of friends most of who at that point were still on AOL or using a MS-variant browser.
Safe bet, eh?
Diagnostics tools are not used because most people in most situations simply do not care. If it displays correctly in their browser, they're happy as pigs in a puddle until someone writes to yell that they forgot a closing </html> tag.
-Sara
Re:Reverse-Engineering Their HTML (Score:1)
I think it's safe to say that the majority of pages on the internet have more errors than the page-that-I-abandoned...
Relative to the amount of markup within a specific document? No, I'd have to say that your farewell page is likely at (possibly above) standard markup error levels.
I also think it's safer to say that a page [...] targe[t]ing people [...] in an anal retentive geek community needs to be more strict about their HTML than a 19 year old girl who is writing stupid things...
That's a terribly unenlightened view for someone who partially self-identifies [slashdot.org] with the geek community (whatever that is). Excusing poor markup management with reference to browsing audience doesn't hold much truck, either. Recommended standards don't change for the unobservant or uncaring.
Diagnostics tools are not used because most people in most situations simply do not care.
I can agree with this. Draw your own conclusions.
Forgive my naiveness but (Score:1)
How may I do that with ipchains and iptables?
Re:Forgive my naiveness but (Score:5, Informative)
Your guess is as good as mine, as usual, someone who had no previous clus about nvp will google it and make a +5 informative post, so just wait for that.
As far as blocking it in ipchains,
-A input -s 0/0 -d 0/0 -p 11 -j DROP
Re:Forgive my naiveness but (Score:1)
Thank you for the blocking script.
Re:Forgive my naiveness but (Score:2)
or DENY if ipchains
same goes for forward, and if an endstation nothing more need be done.
If it is a server with predetermined network needs, the doing the same for output is possible. Actually, even for client workstations you can at the very least limit output to tcp/udp/icmp/more as needed (i.e. ESP/AH), so a default DROP rule is good there too....
If you want to be nice at the risk of consuming upstream bandwidth and opening up a route for other bad stuff, you can use REJECT. I always use DROP, few legitimate systems get hung up on the timeouts and it really slows down a vast majority of port scanners, it also causes your system to slip below the radar for certain scanners, and they never know you're there to attempt attack.. And whatever you do, never *EVER* use MIRROR unless you really really *REALLY* understand what it does and truly know what it is doing. I had a friend who used MIRROR rule liberally, he thought it would be cute to see Script Kiddies scripts backfire on them. Well, we received an attacked with a spoofed source address. The legitimate holder of the source address was operated by CERT. Needless to say thte shit hit the fan when CERT saw what appeared to be him attempting to attack CERT, and he was disconnected from his high speed network access for a year over this in the end.
Just some very basic firewall advice, as is this forum wasn't full enough of it. I always had tight enough reigns on FORWARD and INPUT so this is not so much of an issue, as the system is not at risk for sending out this traffic, but now I think I'll add more strict output rules in case something applicable comes around.
Re:Forgive my naiveness but (Score:1)
I think you can safely block it.
Re:Forgive my naiveness but (Score:2, Redundant)
RFC 741 - Specifications of Network Voice Protocol [faqs.org] (from November 1977!)
Protocol Number Assignments [iana.org]
Re:Forgive my naiveness but (Score:1)
Re:Forgive my naiveness but (Score:2, Informative)
To quote...
Re:Forgive my naiveness but (Score:1)
Re:Forgive my naiveness but (Score:4, Informative)
I don't believe it would do you any harm to block protocol 11. I would recommend that you block all protocols except for udp, icmp, and tcp, while you are at it. In fact, you can probably allow TCP and UDP only if you are a home user. I would just allow ICMP for the hell of it. Just set up a default incoming policy for all packets of "DROP," then accept all TCP packets, or all TCP packets meeting certain criteria, as desired. iptables allows you to specify protocols by number or name in a rule, using the "-p" parameter.
You should be able to block everything except TCP with something like:
iptables -F INPUT
iptables -P INPUT DROP
iptables -A INPUT -p TCP -j ACCEPT
if you also want to accept UDP (you do), then add this:
iptables -A INPUT -p UDP -j ACCEPT
for ICMP:
iptables -A INPUT -p ICMP -j ACCEPT
Note that ping, and a variety of other things, use ICMP, so I reccommend that you enable it.
Proper firewall configuration is a complex topic (and I'm not an expert at it). What I have posted above is not intended to create a safe firewall. I am hoping that you can figure the rest out yourself, or modify the above to suit your needs.
I have to run, so good luck.
MM
--
Re:Forgive my naiveness but (Score:2)
Allowing _only_ icmp udp and tcp will break your ipv6 setup if you have one.
People that don't use IPv6 should ofcourse ignore my advice :)
Re:Forgive my naiveness but (Score:2)
Later.
Re:Forgive my naiveness but (Score:2)
Re:Forgive my naiveness but (Score:1)
I'm an ISP Network engineer with plenty of experience troubleshooting and preventing DOS attacks. If you're not working with the ISP, you have no hope of defending against these, because the attacker is gunning for your bandwidth, not your system. No sane ISP will filter on random protocol numbers because of the resources (router horses and nerd eyeballs) involved. The only proven defense I've seen is to monitor bandwidth usage with mrtg and get the ISP involved kwik. Here is a IOS example that will save you from the dreaded 11 attack. (although you have to detect the attack first: the hard part)
class-map match-all DOS
match access-group 189
policy-map killeleven
class DOS
police 256000 8000 8000 conform-action transmit exceed-action drop
access-list 189 permit 11 any any
erich
ccie4653
Re:Forgive my naiveness but (Score:1)
more
then
more
thank you, drive through.
Re:Forgive my naiveness but (Score:2, Informative)
getprotoent() repeatedly
and find the protocol number you want to use.
If I remember correctly, all of the BGP and EGP, and a number of the router protocols speak something besides straight TCP/UDP. It's essentially anything you can do on layer 4 of the OSI network model.
It's not a port. It's not a port. It's not a port. It's a protocol (you know like the "P" in TCP). It isn't TCP, it doesn't need to be dumbed down with an analogy. Lots of plenty intelligent people on slashdot actually understand some of the technology they post on, honest.
You might want to bone up on some basic networking before talking down to a guy who clearly understands piles more about networking then you demonstrated in your previous post. For all I know you're a networking guru, your last post however did not display that very well.
Service 11 (which communicates over both TCP and UDP according to RH 7.2's /etc/service) is systat, which is a good idea to disable as it gives out information about you're machine. So the idea of shutting off port 11 probably isn't a bad one...
Thanks, Kirby
PS: Sorry to post a complete flame, but the people talking about service 11 (NVP), do actually know a lot about what they are talking about. They don't need somebody to beat them with a cluestick about how ports work in TCP, by somebody who seems completely unaware of the fact that protocols besides TCP/UDP/ICMP exist, and that numbers refer to something other then ports.
Re:Forgive my naiveness but (Score:1)
Re:Forgive my naiveness but (Score:2)
Thanks for pointing our my error without saying "Hey, you fucking dumbass" -- even though it might be implied. While I don't like being wrong more than anyone else, I do appreciate being corrected.
Thanks.
Re:Forgive my naiveness but (Score:1)
Re:Forgive my naivete but (Score:2)
IP has no concept of port numbers - it is a network layer protocol and its job is to deliver packets from one IP address to another. It acts as a "carrier" for other protocols like TCP, UDP, or in this case NVP. To identify this super-protocol, the IP packet has a field for the protocol number. TCP = 6, UDP = 17, NVP = 11. So if an incoming packet says protocol #6, it is passed up to the TCP handler; if it says 17, it is passed to UDP.
Now the TCP/UDP/whatever protocol is free to use whatever means it finds fit to identify the actual process that is the destination of the packet - this is what port numbers are used for. So IP delivers the packet to a certain host, and then the next-level protocol looks at the port number in that packet to figure out which process it should be fed to.
It should be clear now that port numbers have nothing to do with protocol numbers.
Re:Forgive my naivete but (Score:1, Offtopic)
Thanks.
(And I also wish there was a "-1, wrong" moderation so that my post could find its way into the bowels of negativeness more quickly).
Re:Forgive my naiveness but (Score:1)
It turns people into stuck up assholes.
Re:Forgive my naiveness but (Score:1)
Oh c'mon... (Score:3, Informative)
Now someone can't even mention general characteristics of a hack without being criticized for giving information to "script kiddies" or "trojan writers"?
We know that security through obscurity is a poor excuse. I'd rather have this stuff out in the open so I and others can deal with it, than have it known only to a few...
Re:Oh c'mon... (Score:2)
The source code of this is rather usless to a black-hat unless they can also root the box.
Re:Oh c'mon... (Score:2)
Protocol 11 information (Score:4, Informative)
look at it here [networksorcery.com].
Re:Protocol 11 information (Score:1)
If the network is private...
Forgive my naiveness but (Score:1, Redundant)
Would it be harmful if I just block it off?
How may I do the blocking with ipchains and iptables?
Thanks
Re:Forgive my naiveness but (Score:4, Informative)
I have default DENY, and specific ACCEPT rules. As everything I do ACCEPT contains a protocol, this means that unknown protocols are denied. For as long as You run only IPv4, no multicast, and so on (like most people do - although IPv6 is gaining), You only need icmp, igmp, tcp, and udp. Read
If You default to ACCEPT, or have very broad ACCEPT rules based on just eg. the IP addresses, You can, with ipchains, deny as follows: Not tested, but should work.
Re:Forgive my naiveness but (Score:1)
Re:Forgive my naiveness but (Score:2)
This has been annoying the hell out of me (Score:1, Interesting)
* dns queries:
* SOA queries for
* com
* net
* de malformed packet
* edu
* org
* usc.edu
All of these dumbass machines (mostly in Australia) kept hitting my primaries with questions for those! I couldn't figure it out, and no amount of searching on Usenet turned up any help. Now at least I know it's due to some idiot worm drilling me.
Now I get to convert my IP addresses to hex and see what else is up there in that table. Blah.
Feb 22 09:16:46 dns1 named[58]: denied query from [203.134.113.201].4763 for "usc.edu" IN
Did anyone else see this?
Here's the RFC straight from the horse's mouth. (Score:2, Informative)
Usefulness of NVM/Port 11 (Score:1, Informative)
- Recovery of loss of any message without catastrophic effects. Therefore all answers have to be unambiguous, in the sense that it must be clear to which inquiry a reply refers.
- Design such that no system can tie up the resources of another system unnecessarily.
- Avoidance of end-to-end retransmission.
- Separation of control signals from data traffic.
- Separation of vocoding-dependent parts from vocoding-independent parts.
- Adaptation to the dynamic network performance.
- Optimal performance, i.e. guaranteed required bandwidth, and minimized maximum delay.
- Independence from lower level protocols.
Re:Usefulness of NVM/Port 11 (Score:1)
"Design such that no system can tie up the resources of another system unnecessarily"
um, nope, they f***ed that one up.
"- Avoidance of end-to-end retransmission.
- Separation of control signals from data traffic.
- Adaptation to the dynamic network performance."
Go, DOSbots, go!
Re:Usefulness of NVM/Port 11 (Score:1)
Second, the authors of the-binary didn't implement NVP-II, they just stuck "11" in the protocol field (probably so they could avoid blockage/detection by firewalls/IDSes).
It's all spelled out here [honeynet.org].
Interesting summary (Score:2, Funny)
Summary
The program was written in 2000, being inspired by the media attention of the trinoo and TFN DDOS tools. The programmer is most likely young with limited personal resources. The programmer has a low skill level and resorts to the "cut and paste" style of programming. The programmer possibly resides in Europe and socialises with other blackhat style programmers. The programmer is male, overweight and has no social life other than his computer. He wears glasses and was bullied throughout school. He uses computers as a way of getting back at the world which has maligned him. You decide where reality steps aside and Hollywood takes over.
Re:Interesting summary (Score:1)
Re:Interesting summary (Score:2)
ObSpinalTapRef (Score:5, Funny)
Explanation of "Protocol 11" (Score:4, Informative)
1:It's a protocol. In IP speak, It's under the same secion that TCP(6), UDP(17), ICMP(1), and others fit under. On unix boxen, it can be found in
2: It was created specifically for voice transfers, along with "telephone emulation" (just the way you interface with the tele). I believe that many, if not all, webphones use this IP protocol. I also think that GSM and US telephones(that use IP networks) use this protocol to transfer voice data.
Some were asking how this could flood your system.... Well, what's the difference TCP and UDP? Or how about ping floods??? Well, it's all data being sent to you. Doesnt matter what 8 bit field is switched... It's still garbage data (if you didnt request it). It fills up your receving connection.
Hopefully I've explained what this is. I'll probably be modded redundant as somebody probably wrote a better "explanation" while I wrote mine. Oh well.
Re:Explanation of "Protocol 11" (Score:2, Informative)
The winner [honeynet.org] of the challenge noted in his writeup that 'Protocol 11 is reserved for the Network Voice Protocol (NVP-II, rfc741 for the curious). NVP-II is an old protocol, generally not considered to be in use today.'
The binary doesn't use protocol 11 for it's DOS attacks, it uses three known attacks - a SYN flood, a 'jolt' attack (microsoft specific) and a DNS request flood. Protocol 11 was only used for communication between the handler and the agent. Try reading the winner's excellent writeup [honeynet.org] for more information.
Re:Explanation of "Protocol 11" (Score:3, Informative)
Re:Explanation of "Protocol 11" (Score:3, Informative)
2: It was created specifically for voice transfers, along with "telephone emulation" (just the way you interface with the tele). I believe that many, if not all, webphones use this IP protocol. I also think that GSM and US telephones(that use IP networks) use this protocol to transfer voice data.
Nobody uses it. GSM most certainly does not. I'd be surprised if even a single commercially available webphone uses it.
Some were asking how this could flood your system.... Well, what's the difference TCP and UDP? Or how about ping floods??? Well, it's all data being sent to you. Doesnt matter what 8 bit field is switched... It's still garbage data (if you didnt request it). It fills up your receving connection.
This is wrong. The handler sends instructions to the agent via protocol 11. The agent performs traditional DOS attacks. I'm not saying you couldn't flood someone with protocol 11 packets, but that has nothing to do with this tool.
Re:Explanation of "Protocol 11" (Score:2)
As for GSM, etc, within the wireless network itself, that stuff is transmitted as radio frames using fairly standard communication protocols over what is essentially circuit-switched networks (not quite... it's ATM and other things, but it's all point-to-point links in a tree structure) into the core telephony network. Well, at least, that's what the standards dictate. Within company backbones, it's quite possible they're using RTP or something like that for sending the voice, assuming they're using an IP-based, packet-switched transport, but I wouldn't put money on it, especially since I have no direct knowledge in that area of the telephony industry. It's quite likely they're using various proprietary technologies for that. But they're certainly NOT using NVP.
Arg... (Score:1)
tool for performing remote DoS attacks
Re:Arg... (Score:2)
Is it really NVP? (Score:1)
Most machines are not configured to handle NVP. Windows, I don't even know if it has such support. So why did the writer choose NVP? Who is listening to it?
Or is it more correct to say that the writer simply happened to tag his IP packets with #11 as the protocol, which just HAPPENS to be NVP? His implementation may really have nothing to do with NVP except that it uses the same protocol #.
Of course, the source has been DoSed (or slashdotted, however you want to put it) so I can't really look at it.
Re:Is it really NVP? (Score:1, Redundant)
It is some kind of old-fashioned NVP that really isn't used right now. Check this out: Have a nice day.
MM
--
Re:Is it really NVP? (Score:2, Informative)
As such, as long as routers in general route it (since it's encapsulated in IP, this is not a problem) it doesn't matter that noone's listening to it. An already compromised host will be listening to it, and that's what matters.
Yes that means your correct to say that it's just saying that the packets are #11, while not implementing NVP at all.
About the binary (Score:5, Informative)
1) Protocol 11 is used in this tool simply as a messaging protocol. No attempt was made by the author to adhere to the published NVP RFC. The author simply sticks 11 in the protocol field of the IP header. Think of each packet as a UDP packet, no handshake, etc...
2) Protocol 11 is not used to perform any of the DoS attacks. The attacks are fairly standard DoS attacks like TCP SYN, and ICMP echo floods.
3) Protocol 11 get through many firewalls because sysadmins only set up rules to block unwanted TCP, UDP, and ICMP packets.
4) Single incoming protocol 11 packets are used to trigger compromised hosts to perform selected DoS attacks
I hope that helps
Chris
Re:About the binary (Score:2, Insightful)
3) Protocol 11 get through many firewalls because sysadmins only set up rules to block unwanted TCP, UDP, and ICMP packets.
Sad but true. The lesson here is, setup firewalls with default deny rules, and only accept the packets you want.
Re:About the binary (Score:2)
This is yet another reason why you should always use a default deny stance when configuring your firewall. Just blocking proto 11 because you read this article is not going to make your network any more secure.
Re:About the binary (Score:3, Funny)
Re:About the binary (Score:2, Interesting)
From my own playing around with "the-binary" during the contest (on a box that was totally disconnected from the world), I got the following from an strace -f
socket(PF_INET, SOCK_RAW, 0xb /* IPPROTO_??? */) = 0
As you can see, it's opening it as protocol 11, and he didn't miss an 0x from the beginning. So, it's not just UDP.
Re:About the binary (Score:1)
Re:About the binary (Score:2)
so, as i can see, strace interprets data in hexidecimal by default (%X!!), which i dont find surprising at all.
Re:About the binary (Score:1)
Re:About the binary (Score:1)
6)Profit!!!
yes, that old gag again...
$28,000 (Score:1)
why can't we all be Italian? (Score:5, Interesting)
I thought it would be one of those vaporous confabulations of how many BILLIONS of dollars' worth of corporate man hours would be lost to this exploit. Surprise! It's an estimate [honeynet.org] of what he would charge you to do this, if you were paying him ~$70k a year. If you don't want to click, it was about $3500 for the winner, and about $850 for the 9th place guy.
Then I started clicking [honeynet.org] a couple [honeynet.org] at random [honeynet.org], and I noticed that the various [honeynet.org] cost analyses of various teams seem to cluster between $2500 and $4000 or so.
The Italian team [honeynet.org] are the clear outliers, claiming that they would bill over $10,000 JUST for the RE team and the analysis write-up. They included a full day's billing to cover "meeting, discussion, and coffee time."
the conclusions? a) one dutch kid [honeynet.org] can do the work of 8 Italian professionals in about 1/40th the time, and b) i need to get a job in Italy.
Use of unused protocol numbers (Score:3, Insightful)
Other than to be obscure, there's no good reason to use an unused IP protocol number rather than an unused UDP protocol number. This attack could equally well have used an UDP port.
It's worth checking servers to see if there's anything configured to listen to obsolete protocol numbers and unused UDP ports. Many UNIX servers still have a vast number of obsolete Berkeley daemons running. Some, like "biff", have known vulnerabilities. And it's worth checking for traffic on obsolete protocol numbers to see if some spyware is using them.
Re:Use of unused protocol numbers (Score:1)
My thoughts on some of the analysis (Score:2)
For the DNS attack, SOA queries for the following domains are made
com
net
edu
org
de Germany
usc.edu University of Southern California
es Spain
gr Greece
ie Ireland
Why the contrast between country codes for countries in Europe, and an US university? A theory on this is that the programmer resides in Europe, hence the familiarity with the European country codes, and has friends studying at usc.edu.
Having just graduated from USC.... I am more inclined to think that coder is(was) a student here, or at a big rival school (such as UCLA). I would be more likely then that the country codes were the first ones that came to his head, or that they were the countries that his friends (or enemies) originate from. (USC and UCLA both have unordinately large populations of foreign students compared to other US universities)
Re:My thoughts on some of the analysis (Score:2)
Another possible reason why it is the only non-top level domain included.
Next scan of the month... (Score:5, Funny)
Bonus question: explain why this attack had so many valid originating IP addresses.
Stop, reread. (Score:1)
Instructions being "hey, dos this". It doesn't use nvp to flood the target, just to get it's orders from its master kiddie.
Will all the cloobies please log off now. Thank you.
DMCA violation (Score:1, Redundant)
We all know that reverse engineering without the permission of the copyright holder is a violation of the DMCA, and doing so "willfully and for purposes of commercial advantage or private financial gain," such as to win a contest like this one is a criminal offense. Since it's a criminal offense, the victim (the copyright holder) doesn't even have to step up and admit that s/he's the copyright holder.
Sounds like a good test case.
Dion Mendel (Score:3, Interesting)
one hell of a smart guy; although strange at times (not at all bad). married to tiki swain - also another "unfound" talent. many would not see him as a "computer nerd" *g* - he is short, thin, hates working, hates wearing shoes - and, likes to live in the "wild". mcdonalds, coke, all other commercial stuff just isn't his cue - he prefers finding food in the wild
kudo's dion!
Re:About the binary (Score:1)
There was a saying about that but I've forgotten it. Something about closing all the windows and one still being open. Sure anti-virus might be handy, but its not a replacement for a properly configured firewall.
Re:what a tard (Score:2)
If you look at the story the guy calls it protocol 11 but then he tells you to grep netstat output for anything using port 11.
And if you actually read the grep command line, you note that he's only looking for lines with 'raw' in them. Anything other than TCP and UDP shows up in netstat as 'raw' - for example, ICMP is protocol 1, and will show up like this on a RedHat system:
In short... he knows what he is talking about. You, however, should probably go read a man page or two.