Re: Network Mapping and Protocol Analysers

From: Dave Aitel (daveat_private)
Date: Tue Sep 24 2002 - 12:46:00 PDT

  • Next message: The Blueberry: "Re: NGSEC's penetration test sniffer"

    That's because it relies on all sorts of databases to be correct, and
    those can change. However, it's 90% right, and when it's not right, it's
    sometimes close.
    
    Also, you can dial up hong kong on a modem and VR will think you're in
    China, but you aren't. BUT you should be able to tell something about
    the nature of the link from the latency information it provides.
    
    In fact, they offer a lot of free servers you can use, if you're too
    cheap to pay the 40 bucks for what is actually a good, and fairly priced
    product. It makes for a great IRC parlor game. "Hey, babe, what's it
    like in...Wichitaw?" But it's good to use to make sure you're hitting
    the general area you're hitting before you start a pen-test as well. If
    the customer says their data servers are in New York, but you appear to
    be hitting something in CA, then that's a sign you need to make a phone
    call.
    
    -dave
    
    
    On Mon, 2002-09-23 at 15:56, FAN wrote:
    > Visual Route is not always right.
    > I saw many mistakes when IPs are outside US. Specially South America and
    > Asia.
    > Don't know if it's worth it!
    > 
    > 
    > Just my US$ 0.02
    > 
    > 
    > On Fri, 20 Sep 2002, Muhammad Faisal Rauf Danka wrote:
    > 
    > >Protocol Analyser = Ethereal (www.ethereal.com)
    > >
    > >Network Mapping (The way you asked for it) = Visual Route (www.visualroute.com)
    > >
    > ><quote from VR's website>
    > >
    > >VisualRoute has the unique ability to identify the geographical location of routers, servers, and other IP devices. This is highly valuable information for security purposes to help identify the source of network intrusions and Internet abusers
    > >
    > ></quote>
    > >
    > >
    > >Regards
    > >--------
    > >Muhammad Faisal Rauf Danka
    > >
    > >Head of GemSEC / Chief Technology Officer
    > >Gem Internet Services (Pvt) Ltd.
    > >web: www.gem.net.pk
    > >Key Id: 0x784B0202
    > >Key Fingerprint: 6F8C EDCF 6C6E 06A5 48D7  6A20 C592 484B
    > >784B 0202
    > >
    > >_____________________________________________________________
    > >---------------------------
    > >[ATTITUDEX.COM]
    > >http://www.attitudex.com/
    > >---------------------------
    > >
    > >_____________________________________________________________
    > >Promote your group and strengthen ties to your members with emailat_private by Everyone.net  http://www.everyone.net/?btn=tag
    > >
    > >----------------------------------------------------------------------------
    > >This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    > >Service. For more information on SecurityFocus' SIA service which
    > >automatically alerts you to the latest security vulnerabilities please see:
    > >https://alerts.securityfocus.com/
    > >
    > 
    > 
    > ----------------------------------------------------------------------------
    > This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    > Service. For more information on SecurityFocus' SIA service which
    > automatically alerts you to the latest security vulnerabilities please see:
    > https://alerts.securityfocus.com/
    > 
    > 
    
    
    
    



    This archive was generated by hypermail 2b30 : Thu Sep 26 2002 - 18:41:08 PDT