first_weblog_NIM
 
Mittwoch, 22. Juni 2005
PiNg_TrAcErT

PING mit msdos:

+++++++++++++++++++++++++++++++++++

mittwoch, 22_06_2005_2050:

+++++++++++++++++++++++++++++++++++ ping_mittwoch

+++++++++++++++++++++++++++++++++++

sonntag, 26_06_2005_1130:

+++++++++++++++++++++++++++++++++++ ping_so

INTERPRETATION:

ping ergab, dass alle gesendeten Pakete zurückkamen, jedoch ohne Angabe von round-Zeiten. Diese wären für eine Interpretation interessant! Dies ist meiner Meinung nach darauf zurückzuführen, dass die Firewall(s) der orf-Server den ping-Befehl nur eingeschränkt zulassen. Anzumerken sei hier noch, dass die Server des ORF natürlich (aufgrund des hohen Zugriffsvolumens) mehrere öffentliche IP-Adressen haben. So wurde am Mittwoch zB 194.232.104.30, am Sonntag 194.232.104.23 angesprochen. Stichwort 'verteilte Systeme'.

TRACERT mit msdos:

+++++++++++++++++++++++++++++++++++

mittwoch, 22_06_2005_2050:

+++++++++++++++++++++++++++++++++++ tracert_mittwoch

+++++++++++++++++++++++++++++++++++

sonntag, 26_06_2005_1130:

+++++++++++++++++++++++++++++++++++ tracert_so

INTERPRETATION:

Ebenso wie bei ping, ergibt tracert eine Firewall-Aktivität. Die Route lässt sich zwar de facto bis zum ORF-Server verfolgen, dieser lässt jedoch den Befehl an sich nicht durch die Firewall. Da der ORF-Server jedoch am Ende der Kette steht, ist eine Verfolgung de facto doch möglich.
Was die Zeiten betrifft, so ist zu vermerken, dass am Wochenende die Server nicht so schnell reagieren wie unter der Woche. Grund dafür dürften die vielen privaten user sein, die im Internet unterwegs sind.
Anmerkung des Autors: Die pings, tracerts wurden am Sonntag von einem anderen Internetanschluss durchgefüht, als am Mittwoch (wie unschwer zu erkennen ist).

TRACERT mit webtool von UTA:

+++++++++++++++++++++++++++++++++++

mittwoch, 22_06_2005_2050:

+++++++++++++++++++++++++++++++++++
Ergebnis: traceroute to www.orf.at

1 fwsrv1.ces.uta.at (213.90.2.2) 0.514 ms 0.207 ms 0.421 ms
2 213.90.1.17 (213.90.1.17) 1.345 ms 0.720 ms 0.797 ms
3 wat1-15-21.net.uta.at (62.218.15.21) 1.489 ms 0.605 ms 0.824 ms
4 c76vix1-g4-2.net.uta.at (212.152.192.105) 1.506 ms 1.818 ms 1.701 ms
5 cvix1.apa.net (193.203.0.5) 1.518 ms 1.904 ms 1.731 ms
6 cinter1-gig0-3.apa.net (194.158.155.101) 2.397 ms 2.789 ms 2.147 ms
7 194.158.138.12 (194.158.138.12) 2.431 ms 4.459 ms 3.014 ms
8 www.orf.at (194.232.104.30) 3.314 ms !<10> 2.414 ms !<10> 3.030 ms !<10>

+++++++++++++++++++++++++++++++++++

sonntag, 26_06_2005_1130:

+++++++++++++++++++++++++++++++++++
1 fwsrv1.ces.uta.at (213.90.2.2) 0.871 ms 0.436 ms 0.396 ms
2 213.90.1.17 (213.90.1.17) 1.510 ms 2.264 ms 1.831 ms
3 wat1-15-21.net.uta.at (62.218.15.21) 0.713 ms 0.823 ms 0.882 ms
4 c76vix1-g4-2.net.uta.at (212.152.192.105) 1.654 ms 1.831 ms 1.841 ms
5 cvix1.apa.net (193.203.0.5) 2.626 ms 1.769 ms 1.824 ms
6 cinter1-gig0-3.apa.net (194.158.155.101) 1.638 ms 2.822 ms 2.294 ms
7 194.158.138.11 (194.158.138.11) 3.103 ms 2.380 ms 3.739 ms
8 www.orf.at (194.232.104.25) 5.975 ms !<10> 6.846 ms !<10> 5.193 ms !<10>

INTERPRETATION:

Der Unterschied zum Windows-tool liegt darin, dass beim webtool vom UTA-server ausgegangen wird, dh die Adresse des UTA-Servers (213.90.2.2) das tracert absendet und nicht der eigene Rechner!

PORTSCAN mit webtool:

+++++++++++++++++++++++++++++++++++

Sygate Technologies Quickscan








Your system ports are now being scanned and the results will be returned shortly...
Results from quick scan at TCP/IP address:

193.171.x.x

Ideally your status should be
"Blocked". This indicates that your ports are not only
closed, but they are
completely hidden (stealthed) to attackers.

Service
Ports
Status
Additional Information
FTP DATA
20
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
FTP
21
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
SSH
22
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
TELNET
23
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
SMTP
25
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
DNS
53
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
DCC
59
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
FINGER
79
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
WEB
80
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
POP3
110
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
IDENT
113
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
Location Service
135
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
NetBIOS
139
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
HTTPS
443
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
Server Message Block
445
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
SOCKS PROXY
1080
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
UPnP
5000
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
WEB PROXY
8080
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.


Results from scan of commonly used trojans at TCP/IP address:
193.171.x.x
Service
Ports
Status
Possible Trojans
Trojan
1243
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
Trojan
1999
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
Trojan
6776
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
Trojan
7789
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
Trojan
12345
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
Trojan
31337
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
Trojan
54320
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.
Trojan
54321
BLOCKED
This port has not responded to any of our probes. It appears to be completely stealthed.

Results from scan of ICMP at TCP/IP address:
193.171.x.x


Protocol
Type
Status
Additional Information

ICMP
8
BLOCKED
An ICMP ping request is usually used to test Internet access. However, an attacker can use it to determine if your computer is available and what OS you are running. This gives him valuable information when he is determining what type of attack to use against you.



You have blocked all of our probes! We still recommend running this test both with
and without Sygate Personal Firewall enabled... so turn it off and try the test again.

INTERPRETATION:

Durch die bewusste Verwendung und vor allem RICHTIGE KONFIGURATION einer Firewall können Angriffe von außen verhindert werden. In meinem Fall gibt es bei den obigen ports (Anmerkung: und auch nicht bei anderen) nicht einmal die Möglichkeit für einen anderen Internetuser, sich auf meinem Rechner ports zunutze zu machen, da diese erst gar nicht sichtbar sind.

... comment

 
Online for 7101 days
Last update: 2005.06.26, 12:12
You're not logged in ... login
 
Juni 2005
Mo
Di
Mi
Do
Fr
Sa
So
 
 
 1 
 2 
 3 
 4 
 5 
 6 
 7 
 8 
 9 
10
11
12
13
15
16
17
18
19
20
21
23
24
25
26
27
28
29
30
 
 
 
 
 
PiNg_TrAcErT
PING mit msdos: +++++++++++++++++++++++++++++++++++ mittwoch,...
by rene.hofer.uni-linz (2005.06.26, 12:12)
gute darstellung
gelungene Darstellung der Kennzeichnung von Daten!...
by Martin.Klaushofer.Uni-Linz (2005.06.15, 10:51)
DRM - Digital Rights...
Zu Beginn dieser story möchte ich gleich auf einen...
by rene.hofer.uni-linz (2005.06.14, 22:36)
Sicherheit im Internet
Ich finde das sehr gut wie du das in deinem Beitrag...
by Andrea.Muehlsteiner.uni-linz (2005.05.10, 22:49)
E-Mails - Verschlüsselung
Private emails braucht man mit Sicherheit oftmals nicht...
by rene.bolz.uni-linz (2005.05.10, 19:16)

xml version of this page

made with antville
powered by
helma object publisher