if a person were running a server (on a LAN, for agrument's sake) and a sniffer/network analyzer on the LAN, would they be able to decrypt the SCOPE ID of a client computer connected to their host (mentioned previously) via the 'net?
[ 04-01-2001: Message edited by: smaier69 ]
would a SCOPE ID be a readable part of a packet header?
would a SCOPE ID be a readable part of a packet header?
"I think this day will go down as a black day in the history of mankind"
-Leo Szilard - December 2, 1942, following the first successful nuclear fission test.
-Leo Szilard - December 2, 1942, following the first successful nuclear fission test.
I don't want to sound like an ass, but a main reason to try to obtain a system's scopeid using the method you describe would be to hack into that system. (Its a documented hack)
Scopeid is normally used to help secure systems using netbios.
If you are trying to connect to another system with a certain scopeid you should contact the admin for that info.
Scopeid is normally used to help secure systems using netbios.
If you are trying to connect to another system with a certain scopeid you should contact the admin for that info.
well, i realized how the question sounded (i dont think you sound like an ass. my first reaqction would have been the same had somebody else asked the question), but i was debating with myself about experimenting with setting up a SCOPE ID for the server on my LAN here.
i was just pushing the envelope in terms of security-related questions regarding this. some time ago, i was talking with one of my IT buddies (i'm in a slightly different field, but i know a couple people), and we tossed around a scenario for very high security (by the standards of the day). its juts at the time, the packet header issue had not occurred to me.
i was just curious. i suppose i could answer my own question by going ahead and setting it up and running some tests..... i am just (reputedly, anywys : ) a very lazy man.
[ 04-03-2001: Message edited by: smaier69 ]
i was just pushing the envelope in terms of security-related questions regarding this. some time ago, i was talking with one of my IT buddies (i'm in a slightly different field, but i know a couple people), and we tossed around a scenario for very high security (by the standards of the day). its juts at the time, the packet header issue had not occurred to me.
i was just curious. i suppose i could answer my own question by going ahead and setting it up and running some tests..... i am just (reputedly, anywys : ) a very lazy man.
[ 04-03-2001: Message edited by: smaier69 ]
"I think this day will go down as a black day in the history of mankind"
-Leo Szilard - December 2, 1942, following the first successful nuclear fission test.
-Leo Szilard - December 2, 1942, following the first successful nuclear fission test.
To answer the original question, no , I don't believe you will be able to decypher the scopeid with a sniffer/analyzer. That's what makes it a very good lockdown for netbios (but not a cure-all).
Without detailing the process for obtaining scopeids, let's just say you would have to be an EXTREMELY astute hacker to obtain this information.
Without detailing the process for obtaining scopeids, let's just say you would have to be an EXTREMELY astute hacker to obtain this information.
sweet. if the answer had been "yes", i probably wouldn't have gone through the effort. there are much easier ways to give up a masked address.... no sense in doing so with scopeid.
i am somewhat familiar with whats involved, i just have not actually configured it myself.
looks like i have a project for the weekend... thank you for the input.
i am somewhat familiar with whats involved, i just have not actually configured it myself.
looks like i have a project for the weekend... thank you for the input.
"I think this day will go down as a black day in the history of mankind"
-Leo Szilard - December 2, 1942, following the first successful nuclear fission test.
-Leo Szilard - December 2, 1942, following the first successful nuclear fission test.