I know I am the only person excited by this

Home Forums Polo’s Rabble I know I am the only person excited by this

Viewing 9 reply threads
  • Author
    Posts
    • #1993
      Kurt
      Participant

      But I gotta share (that is what PB is all about…the sharing and caring)

      The new version of nmap security scanner can pick up MAC adresses (the hardware number in an ethernet card) and identify the vendor of the computer.

      So if any of you get kidnapped, be sure to have your family or friends save the ransom e-mail (if any) with headers and send it off to me. If they sent it from a Compaq or HP, I should have my chances of finding the computer that sent it increased.

      Of course this is a free service as well.

    • #5785
      Lee Ridley
      Keymaster

      Not quite right Kurt…

      The MAC address of an Network Interface Card (NIC) is, as you say, globally unique. And the first so many bits of that address (I forget how many) are known as the Organisationally Unique Identifier (OUI).

      Identification of the OUI allows the very simple process of cross-verifying which vendor manufactured the NIC.

      This doesn’t necessarily equate to identification of the computer that the NIC resides in, considering the fact that a vast number (majority, perhaps) of PCs are constructed from scratch, using the seperate components, and assembled by third party dealers.

      By that reasoning, only PCs built by the main manufacturers, such as Dell, HP, Compaq etc. would be identifiable.

      I believe. 8)

    • #5786
      Anonymous
      Member

      So wait…If I should get kidnapped-and they happen to email ransom demands, does that mean you could look at the email and say, “hmmmm, this looks as if it were sent from al mansoor street, house #10 in N.W. Fallujah from a left-handed typist”

      or:

      “hmmm, it seems as if his kidnappers wrote this on a hewlett packard….”

      BTW, Kurt nice job on the BFC, maybe this will help people get back to writing about things related to travel, and travel in less than perfect places- I have to say, I checked in with the Thorn Tree for the very first time yesterday, and I was stunned. As much as BFC’ers make fun of it, it is, well, informative about travel. What I thought the BFC was supposed to be.

    • #5787
      anguilla
      Member

      So wait…If I should get kidnapped-and they happen to email ransom demands, does that mean you could look at the email and say, “hmmmm, this looks as if it were sent from al mansoor street, house #10 in N.W. Fallujah from a left-handed typist”

      or:

      “hmmm, it seems as if his kidnappers wrote this on a hewlett packard….”

      BTW, Kurt nice job on the BFC, maybe this will help people get back to writing about things related to travel, and travel in less than perfect places- I have to say, I checked in with the Thorn Tree for the very first time yesterday, and I was stunned. As much as BFC’ers make fun of it, it is, well, informative about travel. What I thought the BFC was supposed to be

      oops, forgot to log in. sorry.

    • #5788
      Anonymous
      Member

      Actually, on many modern ethernet cards, you can set the MAC address to anything you want. So you could spoof someone else’s address.

      Also, the MAC address isn’t transmitted with email so there is nothing to track. It’s stored temporarily in switches and the router on the net local to the system.

      -David

    • #5789
      Lee Ridley
      Keymaster

      @Anonymous wrote:

      Actually, on many modern ethernet cards, you can set the MAC address to anything you want. So you could spoof someone else’s address.

      Also, the MAC address isn’t transmitted with email so there is nothing to track. It’s stored temporarily in switches and the router on the net local to the system.

      -David

      Is that true?
      I thought that the layer 2 address (MAC address) is not stripped off, just encapsulated within the layer 3 (IP) address.

      … True about overriding the MAC address and assignijng your own though. We use to do precisely that on the British Airways Token Ring network.
      The replacement addresses we used, reflected the building, wiring closet, and switch port number.

    • #5790
      Anonymous
      Member

      My new version could detect a system that I built myself as using an Abit motherboard (w/ integrated ethernet).

      In theory I could detect the specifict type of computer if the computer was still online using the same IP.

      But, in most places you would be kidnapped, they would use dial-up and the IP would be from a pool of IPs, therefore it would take a good deal of work…and not be guarenteed.

      Hence another reason for it being free of charge (not purely due to my generousity, but me also not liking to charge for un-guarenteed work.

    • #5791
      Anonymous
      Member

      Won’t be easy for you. Cause the would be kidnappers probably read this thread.

      And I don’t know for you, but I really don’t think anyone would get the idea to try to get a ransom for me.

    • #5792
      Anonymous
      Member

      And I don’t know for you, but I really don’t think anyone would get the idea to try to get a ransom for me.

      I wonder how much ransom they would ask for for a cart puller?

    • #5793
      Kurt
      Participant

      Maybe to prevent kidnapping we could put our names up on a “rich enough to buy a few plane tickets and own a computer” type website.

      Meaning that if they expect more than the cost of a RT ticket or a low end PC, they will be wasting their time.

      Probably wouldn’t work, but the humor value might make it worth while.

Viewing 9 reply threads
  • You must be logged in to reply to this topic.