>From - Sat Mar 02 00:57:15 2024
Received: by 10.141.32.13 with SMTP id k13mr3229933rvj.5.1205797899969;
Mon, 17 Mar 2008 16:51:39 -0700 (PDT)
Return-Path: <kon..._at_phreaker.net>
Received: from aacompsec.com (aacompsec.com [205.134.161.162])
by mx.google.com with ESMTP id v36si38230723wah.3.2008.03.17.16.51.38;
Mon, 17 Mar 2008 16:51:39 -0700 (PDT)
Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kon..._at_phreaker.net) client-ip=205.134.161.162;
Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kon..._at_phreaker.net) smtp.mail=kon..._at_phreaker.net
Received: from aacompsec.com (localhost [127.0.0.1])
by aacompsec.com (Postfix) with ESMTP id C5DBE5032A8C7
for <tscm-..._at_googlegroups.com>; Mon, 17 Mar 2008 19:51:37 -0400 (EDT)
Message-ID: <47DF02CF.6050006_at_phreaker.net>
Date: Mon, 17 Mar 2008 19:46:23 -0400
From: kondrak <kon..._at_phreaker.net>
Reply-To: kon..._at_phreaker.net
User-Agent: Thunderbird 2.0.0.12 (Windows/20080213)
Mime-Version: 1.0
Content-Type: multipart/alternative;
boundary="------------030407010402060203010306"
To: TSCM-L2006_at_googlegroups.com
Subject: Re: [TSCM-L] {2519} Re: ip manager expert
References: <0989eca0-e0ac-4c60-831f-f5665212a126_at_s19g2000prg.googlegroups.com> <4e6b19dd0803161032x45e7c3b2lee60b61ffdea981b_at_mail.gmail.com>
In-Reply-To: <4e6b19dd0803161032x45e7c3b2lee60b61ffdea981b_at_mail.gmail.com>
X-AAC-KTE-LTE-MailScanner-Watermark: 1206402385.09249_at_m6fnFf6hZy2xJR9wmVbj9A
--------------030407010402060203010306
Content-Type: text/plain; charset=ISO-8859-1
Plus we needn't be putting their malware on OUR machines, allowing them
a direct link back to whatever division of the Red Army they might be.
Remember 3-Com? Be a cold day in hell I'd use any post merger devices
from them and China. Same goes for a Lenovo.
Mark Black wrote:
> On Sat, Mar 15, 2008 at 4:24 PM, ipme <duyo..._at_gmail.com> wrote:
>
>> ip manager expert
>>
>> Sequence
>>
>
> <snip for brevity and grammatical sanity>
>
> Or, instead of using shady software from a country well known for
> stealing the work of others, you can use tools like wireshark, nmap,
> nessus, et al.
>
> I tried to examine this "sniffer" but since it's all in Chinese I
> couldn't tell what it's really supposed to do. A Google for qq sniffer
> only pulls up Chinese links and a filter to English only gives only
> links to mirrors and no English descriptions. I do see that it uses
> the WinPcap packet library. I think it has something to do with trying
> to sniff QQ traffic. QQ is a Chinese instant messaging service, like
> ICQ and AIM. A HEX examination of the .exe shows that the program
> tries to establish a connection with pop.qq.com, which might be a mail
> interface. Also has code to connect via HTTP to wpa.qq.com. Also, a
> function called GETPASSWORD.
>
> Support innovation... never buy Chinese.
>
> Mk.
>
> >
>
>
--------------030407010402060203010306
Content-Type: text/html; charset=ISO-8859-1
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
<title></title>
</head>
<body bgcolor="#ffffff" text="#000000">
Plus we needn't be putting their malware on OUR machines, allowing them
a direct link back to whatever division of the Red Army they might be.<br>
Remember 3-Com? Be a cold day in hell I'd use any post merger devices
from them and China. Same goes for a Lenovo.<br>
<br>
<br>
Mark Black wrote:
<blockquote
cite="mid:4e6b19dd0803161032x4..._at_mail.gmail.com"
type="cite">
<pre wrap="">On Sat, Mar 15, 2008 at 4:24 PM, ipme <a class="moz-txt-link-rfc2396E" href="mailto:duyo..._at_gmail.com"><du..._at_gmail.com></a> wrote:
</pre>
<blockquote type="cite">
<pre wrap=""> ip manager expert
Sequence
</pre>
</blockquote>
<pre wrap=""><!---->
<snip for brevity and grammatical sanity>
Or, instead of using shady software from a country well known for
stealing the work of others, you can use tools like wireshark, nmap,
nessus, et al.
I tried to examine this "sniffer" but since it's all in Chinese I
couldn't tell what it's really supposed to do. A Google for qq sniffer
only pulls up Chinese links and a filter to English only gives only
links to mirrors and no English descriptions. I do see that it uses
the WinPcap packet library. I think it has something to do with trying
to sniff QQ traffic. QQ is a Chinese instant messaging service, like
ICQ and AIM. A HEX examination of the .exe shows that the program
tries to establish a connection with pop.qq.com, which might be a mail
interface. Also has code to connect via HTTP to wpa.qq.com. Also, a
function called GETPASSWORD.
Support innovation... never buy Chinese.
Mk.
</pre>
</blockquote>
</body>
</html>
--------------030407010402060203010306--
Received on Sat Mar 02 2024 - 00:57:15 CST
This archive was generated by hypermail 2.3.0
: Sat Mar 02 2024 - 01:11:43 CST