1. If I design a scanner which slowly and methodically lists every IP in order and connects via HTTP to each one and sends each both a HEAD request and an OPTIONS request, would anyone go after me for that? Would you use a VPN to do something like this? Or does no one really care?
0phidian wrote:1. If I design a scanner which slowly and methodically lists every IP in order and connects via HTTP to each one and sends each both a HEAD request and an OPTIONS request, would anyone go after me for that? Would you use a VPN to do something like this? Or does no one really care?
I actually remember someone doing something similar with nmap, methodically scanning every ip address. However every IP address included some semi-secret government systems, so the guy had feds knocking on his door. I dont think he was ever charged with anything though. His ISP also thought his computer was infected with malware and was a bot, so they shut off his connection and gave him a call. He told them his machine was not infected and he was doing it on purpose. They didnt like that very much.
I actually remember someone doing something similar with nmap, methodically scanning every ip address. However every IP address included some semi-secret government systems, so the guy had feds knocking on his door. I dont think he was ever charged with anything though. His ISP also thought his computer was infected with malware and was a bot, so they shut off his connection and gave him a call. He told them his machine was not infected and he was doing it on purpose. They didnt like that very much.
WallShadow wrote: Are there any logs created in the process of requesting a login, whether successful or failing?
Users browsing this forum: No registered users and 0 guests