Do you have a question? Post it now! No Registration Necessary. Now with pictures!
- Mike - EMAIL IGNORED
June 18, 2005, 1:18 pm
rate this thread
and examining them with ethereal. In one obvious buffer
overflow attack I found:
Frame size = 1506
IP total length = 1492
NTLMSSP data size = 1044
The hex dump shows the NTLMSSP to be in >addition< to the
ethernet frame size, which to me, does not make sense.
The tethereal filter is:
tcp port 80
There are continuation packets, but they do not contain
the correct information.
Thanks for your help,
- » Stored passwords vanished -- is it a bug or a virus?
- — Previous thread in » General Computer Security