Post Reply 
Sidki-23-10-2010 Filter Sets
Jul. 27, 2011, 05:01 AM
Post: #1
Sidki-23-10-2010 Filter Sets
Hi There:

I am a user of Sidki-23-10-2010 config set along with JaXPackIV for IP spoofing.

I have a few questions.

1. Will these config sets help me avoid Browser History sniffing and Browser Cache sniffing.

2. Where can I get the latest Filter Sets?

3. How can a website track visted links and websites?

4. How can a website find out what files are on your Hard disk?

Thanks,
AJ
Add Thank You Quote this message in a reply
Jul. 27, 2011, 09:49 PM (This post was last modified: Jul. 27, 2011 09:51 PM by JJoe.)
Post: #2
RE: Sidki-23-10-2010 Filter Sets
1. Sometimes. Toggles are provided for some of the page elements that these methods use, some commands are blocked or altered, headers are blocked or altered, etc.

2. You have it. There isn't a newer file. Changes have been posted, however.

3. Links to websites that may have been visited are placed in the html. Visited links trigger a file request via css. The addresses of the requested files show the visited sites. There may also be ways via java, javascript, flash, etc.

4. Without a routine actually running on the machine, timing. Requesting a file too quickly (or not at all) may indicate that another file is already on the machine and vice versa.


Doesn't
"! |||||||||||| 3.1 Proxy Spoofing by Default 10.10.16 [jak sd] (o.1) (Out)" enable jax IP spoofing?

HTH
Add Thank You Quote this message in a reply
Jul. 28, 2011, 02:06 PM
Post: #3
RE: Sidki-23-10-2010 Filter Sets
Hi Mr. JJoe Thanks:

I tried Opera 11.50 and FF 5.0 on Browserspy.dk, about CSS exploit. With Sidki's config, on Opera it is able to detect that I accessed Google.com with Javascript on. But in FF 5.0 it does not with or with out Sidki's config set and with or without Javascript.

I love Opera, Can you give a filter for avoiding this CSS exploit. Also I have reading about DeadS exploits, DOM exploits etc.

Recently I posted on a website it took very long to post and it posted a simple sentence 10 times. Is this an example of Buffer overflow exploit? What would happen in a buffer overflow exploit?

Thanks for educating me,

AJ
Add Thank You Quote this message in a reply
Jul. 29, 2011, 04:02 AM
Post: #4
RE: Sidki-23-10-2010 Filter Sets
Quote:With Sidki's config, on Opera it is able to detect that I accessed Google.com with Javascript on.

I don't think the "exploit" needs javascript.

Quote:But in FF 5.0 it does not

I think this "exploit" is simply a consequence of the css standards. So I searched and found http://blog.mozilla.com/security/2010/03...tory-leak/ , http://dbaron.org/mozilla/visited-privacy , and https://bugzilla.mozilla.org/show_bug.cgi?id=147777 . Huh... One could say that they traded a plug for a bug or bugs.

Quote:I love Opera, Can you give a filter for avoiding this CSS exploit. Also I have reading about S exploits, DOM exploits etc.

I can't think of one worth the labor needed to create it. You can disable some troubling features via opera.ini. See http://www.opera.com/support/usingopera/operaini/#vlink , for instance.

Quote:Recently I posted on a website it took very long to post and it posted a simple sentence 10 times. Is this an example of Buffer overflow exploit?

More likely miscommunication or server error, cause unknown by me.

Quote:What would happen in a buffer overflow exploit?

It would depend. These are small questions with potentially big answers.
Google can help, http://en.wikipedia.org/wiki/Buffer_overflow , http://en.wikipedia.org/wiki/Stack_buffer_overflow , but
think before you click.

HTH
Add Thank You Quote this message in a reply
Jul. 29, 2011, 09:13 PM
Post: #5
RE: Sidki-23-10-2010 Filter Sets
Hi Mr:JJoe:

Thanks, I disabled Visted link, it does not show up now. Do you know what web application firewalls are? Are there any for Linux OS?

Thanks,
AJ
Add Thank You Quote this message in a reply
Jul. 30, 2011, 01:12 AM
Post: #6
RE: Sidki-23-10-2010 Filter Sets
http://en.wikipedia.org/wiki/Application_firewall#Linux

Have fun
Add Thank You Quote this message in a reply
Post Reply 


Forum Jump: