mailing list archives
RE: FW: Legal? Road Runner proactive scanning.[Scanned]
From: "Jef Feltman" <feltman () pacbell net>
Date: Fri, 12 Mar 2004 19:22:39 -0800
So if someone comes and knocks on your door at home you shoot them? Do you
consider them a criminal? No, you lock the door and windows.
If your host is on the internet I consider it public and knocking on the
door to see if the shop is open, is not a problem. If you do not want people
coming in the door lock it and give a key to those who need it.
Based on your statement no website should not be accessed by anyone other
than an employee. Sending E-Mail would be a violation also, as the port must
be checked to verify it can be opened to receive.
Port scanning is not an attack it is probe. I have scanned many machines
that have tried to attack my machine trying to verify if it is an attack or
the host has been compromised. Unless the attack is currently in progress,
the host is almost always taken over by a hacker or virus. Scanning the host
allows me to find ports open that prove the host has been attacked and taken
over. Then I am able to inform the ISP or user of the problem. And not go
after some innocent user.
If a company runs a service on the internet they must place a lock on the
door to keep out the unwanted. Otherwise it is open to the public. Remember
there are private and public ip addresses. Public means anyone can access
them without freely unless they harm or steal from the host, just like the
store on the corner.
A port scan has never hurt any machine and never will. Only a poorly
configured host will be hacked. Just as a poorly locked house will be broken
I would certainly consider port scanning to be an attack, based on the
intention(s) implied by such activity.
Although I am far from a security expert from a technical perspective,
it seems to me that the answer to this question lies not in technical
arguments, but rather on determining whether one has the right to access
someone else's network without permission. I, for one, believe that
noone (and no organization) has the right to access my network or any
systems on that network without permission. Permission to access a given
resource does not necessarily have to be explicit (i.e accessing a
publicly hosted web page would generally be permissible), however, ordinary
concepts of reasonableness (what a reasonable person
would consider ok) certainly apply (e.g. intentionally accessing an
accidentally accessible resource that is clearly intended to not be
accessible would be considered improper).
I would view port scanning, regardless of the source, as improper access
to the network. It seems to me that a reasonable person would not
consider it permissible for an outside entity (e.g a business
competitor) to surrepticiously attempt (the breadth and depth of the
access and the resources accessed without explicit permission would help
one determine whether the attempt.is indeed surrepticious) to access
resources on the network.
A port scan against one or more hosts by an outside agent implies an
attempt to find services with potential holes active on the network.
That in, and of itself, implies that the scanner will utilize any
information found to launch (further) attacks against specific hosts in
an attempt to gain further access to the network. As the "scanee", I can
only consider such access an unwanted, unauthorized intrusion with
(likely) malicious intent.
As such, I would necessarily view port scans to be an attack (even if
only limited) against the network.
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
any course! All of our class sizes are guaranteed to be 10 students or less
to facilitate one-on-one interaction with one of our expert instructors.
Attend a course taught by an expert instructor with years of in-the-field
pen testing experience in our state of the art hacking lab. Master the skills
of an Ethical Hacker to better assess the security of your organization.
Visit us at:
RE: Legal? Road Runner proactive scanning.[Scanned] David Gillett (Mar 12)
Dos Attack Craig Spiers (Mar 12)
Re: FW: Legal? Road Runner proactive scanning.[Scanned] Charles Otstot (Mar 12)
RE: FW: Legal? Road Runner proactive scanning.[Scanned] David Gillett (Mar 16)
Re: FW: Legal? Road Runner proactive scanning.[Scanned] Charles Otstot (Mar 17)
RE: FW: Legal? Road Runner proactive scanning.[Scanned] Jef Feltman (Mar 17)
RE: FW: Legal? Road Runner proactive scanning.[Scanned] David Gillett (Mar 18)
Re: FW: Legal? Road Runner proactive scanning.[Scanned] Derek Schaible (Mar 17)
RE: FW: Legal? Road Runner proactive scanning.[Scanned] Jef Feltman (Mar 19)
Re: FW: Legal? Road Runner proactive scanning.[Scanned] Charles Otstot (Mar 22)
- RE: FW: Legal? Road Runner proactive scanning.[Scanned] Jef Feltman (Mar 15)