But THEN.............


[ Follow Ups ] [ Post Followup ] [ Bessler Discussion Board ] [ FAQ ] [ Back to BesslerWheel.com ]

Posted by oooer should I say? (217.28.129.58) on December 13, 2002 at 11:56:25:

I was checkin that code when my firewall flagged up a TCP ICMP block, on port 2763(registered to 'Desktop-DNA')mmmmm, the only other info i cud find on this crafted ICMP packet was from a guy who traced it to...I copied and pasted this(it wuz PGP'd)

Source: 33.33.33.33 (33.33.33.33)
Destination: 192.168.0.181 (192.168.0.181)
Transmission Control Protocol, Src Port: 1433 (1433), Dst Port: 2763 (2763)
Source port: 1433 (1433)
Destination port: 2763 (2763)

to read that the origin of the packet causing the ICMP source quench
was:

33.33.33.33 port 1433,

and the alleged destination was:

192.168.0.181 port 2763.

Odd.. tcp:1433 is common these days, but of all the packets I've got
logged over the last months, not a single one has an *origin* of tcp:1433.

and this is who i found owns the IP block...

DOD Network Information Center (NET-DCMC-1)
7990 Science Applications Court
Vienna, VA 22183-7000
US

Netname: DCMC-1
Netblock: 33.0.0.0 - 33.255.255.255

Coordinator:
DOD Network Information Center (ZD41-ARIN) HOSTMASTER||NIC.MIL
800-365-3642

Domain System inverse mapping provided by:
AAA-VIENNA.NIPR.MIL207.132.116.60
AAA-KELLY.NIPR.MIL199.252.162.251
AAA-VAIHINGEN.NIPR.MIL199.252.154.251
AAA-WHEELER.NIPR.MIL199.252.180.251

Lordy..............
but then its probably just corrupted code from hiccupping sofware
, anyhow windows has at least two backdoors in the OS(strangely one is called NSA key)so anyone with the power wudn't need to try hackneyed IP spoofing stuff.....
Probability is that your latest 'tumbling lead parachutes' wheel design is safe.................



Follow Ups:



Post a Followup

Name:
E-Mail:
Subject:
Comments:
(Archived Message)


[ Follow Ups ] [ Post Followup ] [ Bessler Discussion Board ] [ FAQ ] [ Back to BesslerWheel.com ]