Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Sorry about the automation question that caused the thread to be closed. Let's forget about it, I would just want to have my question related to network security answered, please.
From what I saw in some youtube videos, some people seemed to manage to access someone else's computer, let's say a windows machine. But how can that be if the isp router is in the way ? Is it possible to get a connection to someone on the internet directly, without passing by the isp router? I mean, is there an other internet connection scheme that does not have an isp router, or does a basic adsl connection always go through a router?
An ISP's router does not provide any authentication or authorization for access to a particular machine. Doing so would add volumes of network overhead, to say nothing of how much work it would be to maintain.
So basically, if you ask the router for access to machine X, the router will simply relay your request to machine X. The security has to be managed in one of two places:
- Machine X
- The private network device the owner of Machine X has installed between Machine X and his ISP.
thanks for the answer. I think I get it now, thank you.
But how do I nmap a computer over the internet? If I use the ip address of its isp network card, wouldn't I be scanning his isp router instead ?
If you want to get into things "the right way" I strongly suggest you first get a grip on basic IP suite protocol things and I don't mean TCP/IP Warriors of the net movie-stylee but more like The TCP/IP Guide. Also please leave of the "I want to scan victim X" type of questions: just ask basic, neutral technical questions.
I'm gonna dogpile onto what unSpawn stated above. Understanding TCP/IP is half the battle. It's not something that'll be learned overnight, though. Be prepared to do a lot of reading.
Thanks for the guide I'm reading it and it's interesting. I already had basic notions of it, but only at the local level, that's why I don't understand the internet part that much.
Let me just ask this question and then I'll leave it for today and try to read the whole guide, which is pretty long: how can I nmap and get the OS specification of a computer, instead of the specification of its isp router ?
how can I nmap and get the OS specification of a computer, instead of the specification of its isp router ?
You have already been warned about asking this type of question, you have had your previous thread closed, and you have been given a second chance with Unspawn offering you a suggestion on how to go about things the right way. Don't be surprised if this post earns you a stern response.
Do not ask us to tell you how to get surveillance information on machines; as has already been explained to you, we are not that type of forum. Based on your repeated fixation on this sort of activity, I believe you are lying when you say you are interested in how to protect your own systems.
BTW, unSpawn, thanks for the reminder of Warriors of the Net -- I used to use it in my beginners' class. It's a great intro. for folks who have never touched a computer before. ... Grandma, Aunt Tillie, etc.
Seriously, a good basic tool is ipcalc -- nice colors, lots of info., & does sub- & super- nets. You can learn a lot of networking & IP basics just by playing w/ it.
FWIW, I use the Debian ver. -- that may not be important today, but in the past a less colorful, less complete one came w/ RH (& I do mean RH, not RHEL).
Last edited by archtoad6; 03-03-2011 at 07:22 AM.
Reason: missing word
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.