• Hack Attempt Log -- How to purge that..

    From Joe Delahaye@VERT to mark lewis on Fri Jul 31 10:11:01 2015
    Re: Hack Attempt Log -- How to purge that..
    By: mark lewis to Joe Delahaye on Thu Jul 30 2015 13:14:52

    IP addresses are never untracable... if they are not returning a domain name, that's no problem at all... you can still find out who owns the address with the proper tools... whois is the first that comes to mind... in a short one can
    simply plug the IP into uncle google's search and find all kinds of data about it...



    I assume they can spoof IP addresses as well as phone numbers? Never thought of using Google for that though.



    ... Death, when unnecessary, is a tragic thing.
    --- SBBSecho 2.27-Win32
    * Origin: The Lions Den BBS, Trenton, On, CDN (1:249/303)
    þ Synchronet þ Vertrauen þ Home of Syn
  • From Mro@VERT to Joe Delahaye on Fri Jul 31 13:42:42 2015
    Re: Hack Attempt Log -- How to purge that..
    By: Joe Delahaye to mark lewis on Fri Jul 31 2015 10:11 am


    I assume they can spoof IP addresses as well as phone numbers? Never thought of using Google for that though.


    they can use a proxy. still, you can block that ip or a range of ip ranges and that helps.
    ---
    þ Synchronet þ ::: BBSES.info - free BBS services :::
  • From mark lewis@VERT to Joe Delahaye on Fri Jul 31 22:45:20 2015
    31 Jul 15 10:11, you wrote to me:

    IP addresses are never untracable... if they are not returning a
    domain name, that's no problem at all... you can still find out who
    owns the address with the proper tools... whois is the first that
    comes to mind... in a short one can simply plug the IP into uncle
    google's search and find all kinds of data about it...

    I assume they can spoof IP addresses as well as phone numbers? Never thought of using Google for that though.

    TCP connections cannot spoof IPs and work... the connection has to be solid... there's a three-way handshake to set this up... UDP connections, on the other hand, are stateless and can have spoofed IPs... the difference here is that there's no such thing as a UDP telnet or ssh or rlogin or similar connection...
    they cannot be spoofed...

    )\/(ark

    ... Bald spot? No - solar panel for brain power.
    ---
    * Origin: (1:3634/12.73)
    þ Synchronet þ Vertrauen þ Home of Synchronet þ telnet://
  • From Joe Delahaye@VERT to mark lewis on Sat Aug 1 12:53:24 2015
    Re: Hack Attempt Log -- How to purge that..
    By: mark lewis to Joe Delahaye on Fri Jul 31 2015 22:45:20

    I assume they can spoof IP addresses as well as phone numbers?
    Never thought of using Google for that though.

    TCP connections cannot spoof IPs and work... the connection has to be solid... there's a three-way handshake to set this up... UDP connections, on the other hand, are stateless and can have spoofed IPs... the difference here is that there's no such thing as a UDP telnet or ssh or rlogin or similar connection...
    they cannot be spoofed...

    Oh, OK
    --- SBBSecho 2.27-Win32
    * Origin: The Lions Den BBS, Trenton, On, CDN (1:249/303)
    þ Synchronet þ Vertrauen þ Home of Synchronet þ telnet:/