Home page logo

basics logo Security Basics mailing list archives

Re: FW: Legal? Road Runner proactive scanning.[Scanned]
From: ~Kevin Davis³ <computerguy () cfl rr com>
Date: Thu, 18 Mar 2004 20:10:13 -0500

You forgot that many in this thread have argued that if you have an open
port, you are, in fact, announcing to the world that they (the public)
indeed can use the service of that underlying port.  That was mainly what I
was objecting to.

----- Original Message ----- 
From: "Shawn Jackson" <sjackson () horizonusa com>
To: "~Kevin Davis³" <computerguy () cfl rr com>;
<security-basics () securityfocus com>
Sent: Thursday, March 18, 2004 1:03 PM
Subject: RE: FW: Legal? Road Runner proactive scanning.[Scanned]

By using your own logic, if one were to unknowingly fall victim to a Trojan
and a hacker port scanned that box and found the Trojan holding a port
it is perfectly legitimate and legal for that hacker to make use of that
Trojan and take control of the box.

We forgot that portscans don't use the service of the underlying port, they
only check to see if the port itself is open.

Shawn Jackson
Systems Administrator
Horizon USA
1190 Trademark Dr #107
Reno NV 89521

Email: sjackson () horizonusa com
Phone: (775) 858-2338
       (800) 325-1199 x338

Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off 
any course! All of our class sizes are guaranteed to be 10 students or less 
to facilitate one-on-one interaction with one of our expert instructors. 
Attend a course taught by an expert instructor with years of in-the-field 
pen testing experience in our state of the art hacking lab. Master the skills 
of an Ethical Hacker to better assess the security of your organization. 
Visit us at: 

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]