fooling nmap
Colin Alston
karnaugh at karnaugh.za.net
Sat Sep 4 08:38:54 PDT 2004
vxp wrote:
>pretty much any sort of attack / intrusion attempt begins with information
>gathering on the machine. part of that, would be trying to figure out what
>OS runs on the machine. the more (accurate) information a potential
>attacker can gather on the machine, the more chances that his attempt will
>succeed. obviously, even with this change in place, you'd need to do some
>other things so as to prevent this for example:
>
>$ telnet localhost 22
>Trying ::1...
>Connected to localhost.digital-security.org
>Escape character is '^]'.
>SSH-1.99-OpenSSH_3.6.1p1 FreeBSD-20030924
> ^^^^^^^^^
> banners all over need to be changed
>
>but nevertheless, it'd be a step in the right direction in my opinion
>
>
A great man once said to me "Security by obscurity is, after all, no
security at all."
This is very much a step in the wrong direction.
--
Colin Alston <karnaugh at karnaugh.za.net>
About the use of language:
"It is impossible to sharpen a pencil with a blunt axe. It is
equally vain to try to do it with ten blunt axes instead."
-- E.W.Dijkstra, 18th June 1975. (Perl did not exist at the time.)
More information about the freebsd-net
mailing list