- Community Home
- >
- Servers and Operating Systems
- >
- Legacy
- >
- HPE 9000 and HPE e3000 Servers
- >
- HP 3000 Viruses And Hacking
HPE 9000 and HPE e3000 Servers
1752812
Members
5860
Online
108789
Solutions
Forums
Categories
Company
Local Language
юдл
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
юдл
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-05-2001 04:15 PM
тАО06-05-2001 04:15 PM
HP 3000 Viruses And Hacking
Are there virus's for the HP3000?
Scenario One
A computer is connected to an HP 3000 server via a serial port interface
with software that emulated a terminal (Reflection). This computeris also
connected to the internet through our companies T1/proxy and firewall or
through a dial up connection.
Scenario Two
A computer connected to a Network containing access to a proxy server,
through a firewall, uses Reflection to connect to the HP3000 via TCP/IP.
Is there any possibility that somebody could HACK their way through our
internet connection and route through this computer into the serial port
connection and into the HP 3000 or via TCP/IP and the DTC.
Thanks for all replies in advance.
Craig
Please reply to craig@flyersfan.com
Scenario One
A computer is connected to an HP 3000 server via a serial port interface
with software that emulated a terminal (Reflection). This computeris also
connected to the internet through our companies T1/proxy and firewall or
through a dial up connection.
Scenario Two
A computer connected to a Network containing access to a proxy server,
through a firewall, uses Reflection to connect to the HP3000 via TCP/IP.
Is there any possibility that somebody could HACK their way through our
internet connection and route through this computer into the serial port
connection and into the HP 3000 or via TCP/IP and the DTC.
Thanks for all replies in advance.
Craig
Please reply to craig@flyersfan.com
3 REPLIES 3
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-06-2001 03:09 AM
тАО06-06-2001 03:09 AM
Re: HP 3000 Viruses And Hacking
via snmp, I suppose, unless you've disabled it.
Which you should have at your firewall.
by nature of unix permissions there are no real viruses, only trojans!
Later,
Bill
Which you should have at your firewall.
by nature of unix permissions there are no real viruses, only trojans!
Later,
Bill
It works for me (tm)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-06-2001 03:51 AM
тАО06-06-2001 03:51 AM
Re: HP 3000 Viruses And Hacking
Hi there.
Look at this URL :
http://www.cert.org
That should help you.
Rgds
Alexander M. Ermes
Look at this URL :
http://www.cert.org
That should help you.
Rgds
Alexander M. Ermes
.. and all these memories are going to vanish like tears in the rain! final words from Rutger Hauer in "Blade Runner"
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-20-2001 10:02 AM
тАО06-20-2001 10:02 AM
Re: HP 3000 Viruses And Hacking
Re: virus on 3000
There are no known viruses for the HP 3000.
Re: Scenario one
Yes. If you postulate that someone
could get through your firewall and
gain full control of the "computer"
(let's assume it's a PC compatible,
running Windows of some kind), then
with appropriate software they could
then try to access the HP 3000 ...
just like any user/stranger who
walked up to that PC. I.e., they'd
still have to get through the normal
HP 3000 security. On a properly
secured HP 3000, that means at least
one password (a user or account password),
and possibly much more (e.g., if the 3000
is running SECURITY/3000 from VESoft).
In short, gaining access to the PC doesn't
immediately give them access to the 3000.
However, if they installed a keystroke
logger, they could capture the passwords
used to access the 3000. If you're
worried about *that*, then you better
first look at securing that PC :)
Then, you can look at SECURITY/3000,
which can present different challenge
questions at each logon, making the
keystroke capture technique harder to use.
Or, use SecurID card logon ... with that,
the authorized user has a credit-card
size device that presents an apparent
random number (which changes once a minute).
The logon sequence requires entering
the number along with their normal
logon info (user.account). The SecurID
software know what number should be displaying
at any time. Since every logon
will use a different number, this defeats the
keystroke capture technique.
Re: Scenario 2
Uh, if that first computer (let's call
it a PC again) is on the net, and is using
TCP/IP to connect to the 3000, then
the 3000 is either on the same network
*or* your PC has two netword cards and the
3000 is on a second network. In the former
case, why bother with the PC at all in
your scenario? Why not just ask about
hacking directly into the 3000?
The real question here would probably
be one of proper firewall setup: why
do you think your PCs might be accessible
through it?
There are no known viruses for the HP 3000.
Re: Scenario one
Yes. If you postulate that someone
could get through your firewall and
gain full control of the "computer"
(let's assume it's a PC compatible,
running Windows of some kind), then
with appropriate software they could
then try to access the HP 3000 ...
just like any user/stranger who
walked up to that PC. I.e., they'd
still have to get through the normal
HP 3000 security. On a properly
secured HP 3000, that means at least
one password (a user or account password),
and possibly much more (e.g., if the 3000
is running SECURITY/3000 from VESoft).
In short, gaining access to the PC doesn't
immediately give them access to the 3000.
However, if they installed a keystroke
logger, they could capture the passwords
used to access the 3000. If you're
worried about *that*, then you better
first look at securing that PC :)
Then, you can look at SECURITY/3000,
which can present different challenge
questions at each logon, making the
keystroke capture technique harder to use.
Or, use SecurID card logon ... with that,
the authorized user has a credit-card
size device that presents an apparent
random number (which changes once a minute).
The logon sequence requires entering
the number along with their normal
logon info (user.account). The SecurID
software know what number should be displaying
at any time. Since every logon
will use a different number, this defeats the
keystroke capture technique.
Re: Scenario 2
Uh, if that first computer (let's call
it a PC again) is on the net, and is using
TCP/IP to connect to the 3000, then
the 3000 is either on the same network
*or* your PC has two netword cards and the
3000 is on a second network. In the former
case, why bother with the PC at all in
your scenario? Why not just ask about
hacking directly into the 3000?
The real question here would probably
be one of proper firewall setup: why
do you think your PCs might be accessible
through it?
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
News and Events
Support
© Copyright 2024 Hewlett Packard Enterprise Development LP