12-13-2001
OK. You have a binary file of TCPDUMP info on a shared system which means you have a file with captured passwords and logins (and maybe credit card info) on a shared system you do not own.
You don't understand what you are doing, so you obviously are not a system admin. I suggest you delete the file to protect the security of those users immediately and report the capture file to the owners of the system.
Or, report it to the system admins and give them the file.....
What legitmate use of a large file of captured network traffic data could you have on a shared system? Inquiring minds want to know
10 More Discussions You Might Find Interesting
1. Cybersecurity
Hi,
I am stuck with a tricky situation in which one of my applications is flooding the network with UDP messages. The architecture of the application is not supposed to do so. Neither is there any place where the application will go into an infinite loop sending UDP messages over the network. To... (3 Replies)
Discussion started by: diganta
3 Replies
2. Solaris
Hi,
I have two Solaris machines.
1. SunOS X 5.8 Generic_108528-29 sun4u sparc SUNW,Sun-Blade-1500
2. SunOS Y 5.8 Generic_108528-13 sun4u sparc SUNW,Ultra-60
I am trying to buiild a project on both these machines. The Binary output file compiled on machine 2 runs on both the machines. Where... (0 Replies)
Discussion started by: scgupta
0 Replies
3. Shell Programming and Scripting
Greetings, I just started using scripting languages,
im trying to get a tcpdump in a file, change the
file name every 5mins ... this is what i have but its
not working ... any suggestions?
#!/bin/bash
# timeout.sh
#timestamp format
TIMESTAMP=`date -u "+%Y%m%dT%H%M%S"`
#tdump =`tcpdump... (3 Replies)
Discussion started by: livewire
3 Replies
4. IP Networking
I am trying to capture tcpdump for traffic to a port in a file but this does not seem to capture all the packets. Command I use is :
tcpdump -w tdump.dat port 22
Why is it not capturing all the packets ?
Here is my experiment:
root@pmode-client6 adc-demo]# tcpdump port 22
tcpdump:... (5 Replies)
Discussion started by: radiatejava
5 Replies
5. Shell Programming and Scripting
Hi,
I wrote a small script whose function is to execute the postemsg provided if the threshold breaches.
I want to log this postemsg messages to a log file. But I am not able to do. Can someone throw some light on how to log the output of this. I am pasting a snippet of that code.
... (2 Replies)
Discussion started by: dbashyam
2 Replies
6. UNIX for Dummies Questions & Answers
I am using grep to match a pattern, but the output is strange.
$ grep -r -o "pattern" *
Gives me:
Binary file foo1 matches
Binary file foo2 matches
Binary file foo3 matches
To find the lines before/after, I then have to use the following on each file:
$ strings foo1 | grep -A1 -B1... (0 Replies)
Discussion started by: chipperuga
0 Replies
7. UNIX for Advanced & Expert Users
Hello,
Can I copy a binary file while the file is being written to by another process?
Another process (program) “P1” creates and opens (for writing) binary file “ABC” on local disk. Process P1 continuously write into ABC file every couple of seconds, adding 512-byte blocks of data. ABC file... (1 Reply)
Discussion started by: mbuki
1 Replies
8. Shell Programming and Scripting
I am struck up with a problem and that is with output redirection.
I used all the ways for the redirection of the output of c binary to a file, still it is failing.
Here are the different ways which I have used:
./a.out | tee -a /root/tmp.txt 2>&1
./a.out | tee -a /root/tmp.txt 1>&1
./a.out |... (2 Replies)
Discussion started by: Maya29988
2 Replies
9. UNIX for Dummies Questions & Answers
Hello guys,
We had to move from a DC to another, and we are now facing an "issue" with some text files.
Looks like that some of our log files are set as binary:
file TuxConnectorURA.20121012
TuxConnectorURA.20121012: data or International Language text
less TuxConnectorURA.20121012... (2 Replies)
Discussion started by: EnioMarques
2 Replies
10. Shell Programming and Scripting
Hello *nix specialists,
Im working for a non profit organisation in Germany to transport DSL over WLAN to people in areas without no DSL. We are using Linksys WRT 54 router with DD-WRT firmware There are at the moment over 180 router running but we have to change some settings next time. So my... (7 Replies)
Discussion started by: digidax
7 Replies
LEARN ABOUT SUSE
opieaccess
OPIEACCESS(5) File Formats Manual OPIEACCESS(5)
NAME
[/etc/]opieaccess - OPIE database of trusted networks
DESCRIPTION
The opieaccess file contains a list of networks that are considered trusted by the system as far as security against passive attacks is
concerned. Users from networks so trusted will be able to log in using OPIE responses, but not be required to do so, while users from net-
works that are not trusted will always be required to use OPIE responses (the default behavior). This trust allows a site to have a more
gentle migration to OPIE by allowing it to be non-mandatory for "inside" networks while allowing users to choose whether they with to use
OPIE to protect their passwords or not.
The entire notion of trust implemented in the opieaccess file is a major security hole because it opens your system back up to the same
passive attacks that the OPIE system is designed to protect you against. The opieaccess support in this version of OPIE exists solely
because we believe that it is better to have it so that users who don't want their accounts broken into can use OPIE than to have them pre-
vented from doing so by users who don't want to use OPIE. In any environment, it should be considered a transition tool and not a permanent
fixture. When it is not being used as a transition tool, a version of OPIE that has been built without support for the opieaccess file
should be built to prevent the possibility of an attacker using this file as a means to circumvent the OPIE software.
The opieaccess file consists of lines containing three fields separated by spaces (tabs are properly interpreted, but spaces should be used
instead) as follows:
Field Description
action "permit" or "deny" non-OPIE logins
address Address of the network to match
mask Mask of the network to match
Subnets can be controlled by using the appropriate address and mask. Individual hosts can be controlled by using the appropriate address
and a mask of 255.255.255.255. If no rules are matched, the default is to deny non-OPIE logins.
SEE ALSO
opie(4), opiekeys(5), opiepasswd(1), opieinfo(1), opiesu(1), opielogin(1), opieftpd(8)
AUTHOR
Bellcore's S/Key was written by Phil Karn, Neil M. Haller, and John S. Walden of Bellcore. OPIE was created at NRL by Randall Atkinson, Dan
McDonald, and Craig Metz.
S/Key is a trademark of Bell Communications Research (Bellcore).
CONTACT
OPIE is discussed on the Bellcore "S/Key Users" mailing list. To join, send an email request to:
skey-users-request@thumper.bellcore.com
7th Edition January 10, 1995 OPIEACCESS(5)