Handler on Duty: Xavier Mertens
Threat Level: green
Loading...
|
|
Submitted By | Date |
---|---|
Comment | |
2004-05-21 15:39:10 | |
Here is an interception of traffic on destination port TCP/14059 done with the help of nc (netcat): Command used : echo ====== ; nc -l -n -p 14059 ; echo ====== It seems to be a Peer2Peer application based on Gnutella called BearShare. I added the lines made from "=" to mark start and stop of traffic. I assume that my PPP connection used to be the previous IP address of someone usnig this BearShare application. I edited the actual capture : I replaced my current IP address by xx.xx.xxx.xxx. Well I hope it help :) ================================================================================== GET /uri-res/N2R?urn:sha1:VEYYKVX5DZL7AT5LT4QY6RNHW3VZQO2Z HTTP/1.1 Connection: Keep-Alive Host: xx.xx.xxx.xxx:14059 User-Agent: BearShare 4.4.1.16 Range: bytes=147831901-168950743 Content-Disposition: inline; filename=TLF-GAME-11.30.03.Spellforce_Order_Of_Dawn-FLT-CD1-ENG.bin X-Queue: 0.1 X-Alt: 217.211.198.218,80.57.57.229:21927,213.132.131.181:32920 X-Gnutella-Content-URN: urn:bitprint:VEYYKVX5DZL7AT5LT4QY6RNHW3VZQO2Z.LXKQZ7AOIII4KMR7YT3W4QNHQC43GQFX4IQOPLA X-Connection-Type: T1 FP-1a: 128,p?0?6??cL]Ofj??FwX8???\g?A8??¿9!C FP-Auth-Challenge: 7PELWD3OZSVQNHP5GA5CDK23UUZRQYO5 X-Features: browse/1.0, queue/0.1 X-Node: 24.1.34.128:6346 ================================================================================== |
CVE # | Description |
---|