Ifconfig does not work on Windows. Are you saying that there are other operating systems brain-dead enough to just run any old arbitrary code from untrusted media? Sent from my Android phone using TouchDown (www.nitrodesk.com) -----Original Message----- From: [valdis.kletnieks@vt.edu] Received: Sunday, 15 Jul 2012, 9:45 To: Jimmy Hess [mysidia@gmail.com] CC: [nanog@nanog.org]; Brandon Ross [bross@pobox.com] Subject: Re: using "reserved" IPv6 space On Sat, 14 Jul 2012 17:37:37 -0500, Jimmy Hess said:
The good news is one 'ifconfig' just tells them what network address you're in. Unless the attacker can gain access to your host's NDP table or ARP table, they can't see what IPs are in use.
All it takes is one USB stick left out in the parking lot for an employee.. By the time they get enough access to do an 'ifconfig', rest assured that they can see the NDP/ARP tables and all the traffic on that network segment as well. (OK.. maybe for some reason they can't - but if you're betting your security model on somebody getting a beachhead on one of your machines and *not* having full access to the network segment, I'll be more than happy to take the other side of the bet). Sent from my Android phone using TouchDown (www.nitrodesk.com)
Ifconfig does not work on Windows.
i am about as far from a windows expert as you can get. but i believe it is ipconfig
Are you saying that there are other operating systems brain-dead enough to just run any old arbitrary code from untrusted media?
Sent from my Android phone
ROFL! randy
On 7/15/12, Keith Medcalf <kmedcalf@dessus.com> wrote:
Ifconfig does not work on Windows.
Who needs ifconfig with windows? any user who can open a cmd session can run IPCONFIG /ALL The same can be queried remotely using WMI Select * From Win32_NetworkAdapterConfiguration WHERE IPEnabled=true
Are you saying that there are other operating systems brain-dead enough to just run any old arbitrary code from untrusted media?
That depends... what do you mean by untrusted media? Many OSes, even certain versions of Linux that support Firewire can be coerced into running arbitrary code, by plugging in a malicious firewire device, unless there is an IOMMU or other measures protecting against malicious memory access when a DMA is requested Various hardware devices, and drivers have vulnerabilities, even without 'autoplay'. And some *ix distros do support 'autoplay-like' functionality.
Sent from my Android phone using TouchDown (www.nitrodesk.com) -- -JH
On Sun, 15 Jul 2012 17:55:44 -0600, "Keith Medcalf" said:
Are you saying that there are other operating systems brain-dead enough to just run any old arbitrary code from untrusted media?
As Vint Cerf pointed out, 140 million pwned boxes. How you think they got that way, and what are the chances that *none* of them are inside your net?
participants (4)
-
Jimmy Hess
-
Keith Medcalf
-
Randy Bush
-
valdis.kletnieks@vt.edu