|
|
|
|
|
|
|
![]() |
#1 |
I'm normally not a praying man, but if you're up there, please save me Superman!
|
Nice dude
![]() ![]() What I would suggest (in hardcore mode data collecting) is to perform a quick scan on the client's machine - some port probing and additionally version identification on network services running on the box. There're many internal AND filetered protocols that are used for software packages to communicate with each other, as there're many protocols that are somehow related to hardware installed on the machine (again communication/control tools). The trick is to use a separate client to do the job (ie, get a queue of hosts to scan and scan them (as long as it's legal of course)). I'm sorry, I just had to speak with somebody about that kind of thins ![]() Best wishes, Andrew
__________________
The tendency is to push it as far as you can -- Fear and Loathing In Las Vegas |
![]() |
![]() |
![]() |
|
|