ET P2P Torrent Client User-Agent (Solid Core/0.82)

I have been seeing this alert “ET P2P Torrent Client User-Agent (Solid Core/0.82)” on networks for sometime now and was able to narrow it down to being related to Adobe Flash (Firefox and Chrome). I am not sure why Adobe is using a torrent client in its flash but this seems to be the source.

This is also triggered not only by updating the software, but from the web installer when it connects out.

I later confirmed this myself with the assistance of another who updated their flash and triggered this alert.


I hope you enjoyed this post
Please visit me on Facebook @ & via twitter: #jermsmit

Some Basic Use of Nmap

Nmap (“Network Mapper”) is a free and open source utility for network discovery and security auditing. I along with many other systems and network administrators also find it to be a useful tool for the right job. Nmap can be installed and used in Windows, and mostly common in Linux distributions such as Debian and the well known Ubuntu.

You can get the Windows install form along with the Linux versions.  In Linux (Debian) I simple sudo apt-get install nmap -y and the rest is done in a few seconds.

Now that you have Nmap, what can you do? Here are some examples I use every so often:

~# nmap – gives me info about (Hostname resolves to 11 IPs..)

~# nmap – scans my network and return info on machines and service ports listening

~# nmap -sP – attempts to detect if a host is up or down

~# nmap -PN – attempts to detect if a host is up or down (no pings sent)

~# nmap -sT – port scan using TCP

~# nmap -sU – port scan using UDP

~# nmap -O – attempts to identify the remote OS, returns TCP/IP fingerprint

And I could go on, but lets just end these example here and I’m sure you’ll find others.

Run … run, you clever boy … and remember. – Clara Oswald

dump packets with tcpdump

How many times did you forget the parameters.  I have, countless time.
Lets see if my sharing here I will remember some of my favorite commands

# tcpdump -nnXSs 0 ‘port 5060’

Command switches (what they are for)

  • “-nn” plays nice by not looking up hostnames in DNS or service names.
  • “-X” makes it print each packet in hex and ascii
  • “-S” print absolute rather than relative TCP sequence numbers
  • “-s 0” by default tcpdump will only capture the beginning of each packet, using 0 I get it all


Facebook Video Calling (Powered by Skype)

With a simple and straightforward method of using, Facebook video calling is simply awesome. To get up and going with using the video feature you first need to install a plugin ( and from that point on you have what is necessary to use this new feature.


Making a video call is easy.

Look at the list of your friends (in the lower right-hand corner of your Facebook page) who are currently available on Facebook chat. Double-click a name, and you’ll see there’s a new icon at the top of the chat screen — a small video camera. Click it to send an invitation for that person to participate in a video chat. They’ll receive a pop-up notification to a video chat, and if they don’t have the plugin installed, they’ll be prompted to install it.


The video and sound quality is exceptional; however I do have my problems with the video chat screen taking up your screen and the inability to resize it.  All in all, I like it.  Good Job Facebook Team

Update On PlayStation Network: Hacked

It’s been about 4 days that the PlayStation Network has been down.  Sony official admits that its been three days; Whatever!   Last night our friends at Sony admitted to being hacked which is why they chose to take-down the PlayStation Network along with other services.

To Quote what was written on PlayStation blog:

Posted by Patrick Seybold // Sr. Director, Corporate Communications & Social Media
“An external intrusion on our system has affected our PlayStation Network and Qriocity services. In order to conduct a thorough investigation and to verify the smooth and secure operation of our network services going forward, we turned off PlayStation Network & Qriocity services on the evening of Wednesday, April 20th. Providing quality entertainment services to our customers and partners is our utmost priority. We are doing all we can to resolve this situation quickly, and we once again thank you for your patience. We will continue to update you promptly as we have additional information to share.”

I am glad Sony has come forward and admitted this to the public, however the question I now ask is… To what extent were they hacked?  Is my account info safe?