- Joined
- Dec 1, 2011
- Messages
- 33,086
- Reaction score
- 14,055
- Location
- FL - Daytona
- Gender
- Male
- Political Leaning
- Independent
Thats stupid.
You dont understand the technology and thats ok.
I build PC's and networks for a living sir, try again.
Thats stupid.
You dont understand the technology and thats ok.
What is the favorite tool of security experts to send raw data?
EDIT: It's been 10 minutes Mr. "wax tech". What's wrong, can't Google the answer?
What does this have to do with the topic? I aint googling ****.
What are you asking me?
I build PC's and networks for a living sir, try again.
You say you're a security expert that makes $450 an hour for consultations. You don't know how to send raw data on a network?
Lol, you caught me. /facepalm
You asked me for a tool, because you read something somewhere. Tell me what you want to do, and for a fee I will tell you how to do it.![]()
You are literally a bike mechanic to my rocket science.
We build complex wan/lan and vpn networks, provide penetration testing, optimization, and security services.
Our "we build pcs and networks for a living" guys are all now managed services.
I have 100 employees, most all with a tech background that surpasses "i build pc's"
Thats completely different and I am sure in your contracts. There is no QoS over the internet, but you better thank level 3 for traffic shaping.
So you had single provider in you datacenter? Or was it a combined line of isps? You have proof isps throttled you to the customer endpoint?
Depends, sometimes we were on Level 3, other times through multiple providers, sometimes Cogent. Net Neutrality regulates traffic before it hits a peer, which would be the case regardless of whether you were in a facility through multiple providers (and thus buying bandwidth from the HF itself), or you were contracted with one or more providers directly.
Mr. Rocket Science, what tool would a pen tester use to send raw data to a port to see how it responds?
Yet you still don't understand basic human impulses to control as much as possible. That's why we have law.
I'm not going to try to out tech you with Virtual Proxy Networks or that a SOCKS proxy is basically an SSH tunnel in which specific applications forward their traffic down the tunnel to the server, and then on the server end, the proxy forwards the traffic out to the general Internet. Unlike a VPN, a SOCKS proxy has to be configured on an app by app basis on the client machine.
I'd rather tackle the big picture than the details, where you're failing pardner.
There is no QoS between across providers. However, there certainly was traffic prioritization with each provider. There is a reason why probably 90% of IT professionals are in favor of Net Neutrality.
Depends, sometimes we were on Level 3, other times through multiple providers, sometimes Cogent. Net Neutrality regulates traffic before it hits a peer, which would be the case regardless of whether you were in a facility through multiple providers (and thus buying bandwidth from the HF itself), or you were contracted with one or more providers directly.
I think 'The Rev' pooped out on us? It's hard to defend the indefensible.
omg really?
Did you just google this?
https://www.google.com/search?q=pen.....69i57j0l5.3827j0j9&sourceid=chrome&ie=UTF-8
37 Powerful Penetration Testing Tools For Every Penetration Tester ? Software Testing Help
then think you found yourself smart on this?
What we use is proprietary, that said, wireshark is one of the most common tools for all sorts of of packet monitoring, capturing, etc. metasploit is the answer you are looking for.
If you want more than that, you have to pay me.
anyone could have googled that and answered your sophomoric question.
I build PC's and networks for a living sir, try again.
LoL, WRONG!
I asked a question that only a real security guy would know. Somebody who actually does the work at the ground level and has spent years behind a shell. I think you might be a business guy that knows high level conceptual stuff, but the implementation or low level details I don't think you know jack ****.
A hacker's best friend is Netcat, dummy. You use it to make connections, send data, watch the response, etc. You can do all kinds of things with it.
I didn't ask about a GUI packet sniffer, lol. You don't send data with Wireshark LOL.
Metasploit? Are you high? I did not ask about pushing exploits.
No, nobody could have Googled that. I made the question specifically so that only somebody who is an infosec pro would have any idea what I was talking about. You failed. Stop pretending you're more than you are. You stick to talking to people and saying "yeah we can build you a SOHO network" and let real engineers do the actual work.
I doubt Rev has ever been even A+ certified, you likely know far more than he does. He talks 'about' stuff but doesn't know anything deeper than that. Probably a paper pusher.
wow.....
https://wiki.wireshark.org/Tools#Traffic_generators
This is probably over your head.
NC is a backend tool for generating data, just as many of those things listed in the wireshark "traffic generator" link does. you read about netcat and fancy yourself a hacker now.
You are just butthurt because you can't show me one instance of throttling, you dont understand net neutrality or Net Neutrality.
My company (among other things):
Firewall specialists, security design and implementation
Penetration testing
IT Forensics
Optimization
Managed Services
traffic managment
etc. etc.
certifications among others:
GSE GIAC Security Expert
GSE-Malware
GIAC Security Expert in Malware
GSE-Compliance
GIAC Security Expert in Compliance
GIAC
GISSP
CISM
COMPTIA Security +
CEH
NUMEROUS Vendor certifications from checkpoint, Juniper, Palo Alto, Cisco, and many others.
One of our core functions is bringing companies to ISO/IEC 27001 certification....
LoL... you're doing mental gymnastics to try and right your wrong.
I've used Netcat to learn and test network fundamentals, to explore networks, to test my web server on my local network to troubleshoot it before I push it to the cloud. I've used it in bash scripts to do various fun things. And yeah I've done a lot of reading.
What have you done with it?
"Your company", but not YOU. I have half those certs. What do YOU have?
Not at all. you used netcat because you are a script kiddie with delusions of being some kind of master hacker. yer not.
I don't believe you. if you did, you would be able to move out of your parents basement and get an actual job.