[17042] in bugtraq
Re: Cisco PIX Firewall allow external users to discover internal
daemon@ATHENA.MIT.EDU (Dug Song)
Wed Oct 4 03:25:21 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-Id: <20001003152026.C30158@naughty.monkey.org>
Date: Tue, 3 Oct 2000 15:20:26 -0400
Reply-To: Dug Song <dugsong@MONKEY.ORG>
From: Dug Song <dugsong@MONKEY.ORG>
X-To: "Fabio Pietrosanti (naif)" <naif@INET.IT>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <Pine.LNX.4.21.0010031144240.30270-203000@naif.inet.it>; from
naif@INET.IT on Tue, Oct 03, 2000 at 12:24:09PM +0200
On Tue, Oct 03, 2000 at 12:24:09PM +0200, Fabio Pietrosanti (naif) wrote:
> 227 Entering Passive Mode (xxx,xxx,xxx,xx,18,237)
> ===== Under this kind of dos, after 21th ftp session that flood pix with PASV
> 227 Entering Passive Mode (172,16,1,2,6,113)
here's an older tool that may be useful for testing, with -v:
http://www.monkey.org/~dugsong/ftp-rpc-probe.sh
-d.
---
http://www.monkey.org/~dugsong/