- Posts: 1302
- Thank you received: 0
How could this work?
19 years 7 months ago #10224
by DaLight
Replied by DaLight on topic Re: How could this work?
Definitely. Very illuminating and a real eye opener!
19 years 7 months ago #10231
by Rockape
Replied by Rockape on topic Re: How could this work?
OK,
Thanks for that. I'll have a chat with the bishop and see if we will have a play with this at some time.
Thanks for that. I'll have a chat with the bishop and see if we will have a play with this at some time.
19 years 7 months ago #10233
by TheBishop
Replied by TheBishop on topic Cain and Abel
Play now!! Work can wait. Oh and while you're at it, put the kettle on will you Rockape? I always play better over a nice cup of tea...
19 years 7 months ago #10235
by sahirh
Sahir Hidayatullah.
Firewall.cx Staff - Associate Editor & Security Advisor
tftfotw.blogspot.com
Replied by sahirh on topic Re: How could this work?
Cain is fun for the whole family. You might want to look into some of the other VoIP security tools.. such as Vomit -- which converts Cisco VoIP conversations into wav files from tcpdump output:
vomit.xtdnet.nl/
Wrt wide-scale traffic interception -- the capability is there, however I personally fail to see the effectiveness, given that your transmissions will be buried among so much background noise of the Internet at work
Not to mention that anyone with even the slightest degree of sophistication will use encryption -- and strong encryption at that -- which would render keyword matching and the like useless. Perhaps traffic analysis (the fact that person A talked to person B, regardless of what they spoke about) might be useful, but in a more limited way.
Lets face it -- tracking the identity of someone *purely* on the Internet is difficult. What happens if the guy is logged in from an open wireless network in a busy business district bouncing through a couple of systems that he personally 'owns', then fires all his communications through Tor (tor.eff.org), further squeezes them through a few more publicly abused proxies (so that he is once again shielded by massive logs), and all of this is happening encrypted.
It's more than difficult -- the only people with the resources to track something like that would probably find it easier to get him 'offline', perhaps at the most using a TEMPEST attack:
www.surasoft.com/articles/tempest.php
to read what he's upto before the men in suits show up and bundle him into a black helicopter.
Hehe it sounds rather random talking about it like this, but hey -- dyou see any reason why its *not* possible? Besides, I'm sleepy, my imagination could use a stretch!
-- Disclaimer --
I happened to watch 'Sneakers'
www.imdb.com/title/tt0105435/
again last night, so my views are a little paranoid right now
Cheers all,
vomit.xtdnet.nl/
Wrt wide-scale traffic interception -- the capability is there, however I personally fail to see the effectiveness, given that your transmissions will be buried among so much background noise of the Internet at work

Not to mention that anyone with even the slightest degree of sophistication will use encryption -- and strong encryption at that -- which would render keyword matching and the like useless. Perhaps traffic analysis (the fact that person A talked to person B, regardless of what they spoke about) might be useful, but in a more limited way.
Lets face it -- tracking the identity of someone *purely* on the Internet is difficult. What happens if the guy is logged in from an open wireless network in a busy business district bouncing through a couple of systems that he personally 'owns', then fires all his communications through Tor (tor.eff.org), further squeezes them through a few more publicly abused proxies (so that he is once again shielded by massive logs), and all of this is happening encrypted.
It's more than difficult -- the only people with the resources to track something like that would probably find it easier to get him 'offline', perhaps at the most using a TEMPEST attack:
www.surasoft.com/articles/tempest.php
to read what he's upto before the men in suits show up and bundle him into a black helicopter.

Hehe it sounds rather random talking about it like this, but hey -- dyou see any reason why its *not* possible? Besides, I'm sleepy, my imagination could use a stretch!
-- Disclaimer --
I happened to watch 'Sneakers'
www.imdb.com/title/tt0105435/
again last night, so my views are a little paranoid right now

Cheers all,
Sahir Hidayatullah.
Firewall.cx Staff - Associate Editor & Security Advisor
tftfotw.blogspot.com
19 years 7 months ago #10249
by DaLight
Good film!!
Replied by DaLight on topic Re: How could this work?
I happened to watch 'Sneakers'
www.imdb.com/title/tt0105435/
again last night, so my views are a little paranoid right now
Good film!!
Time to create page: 0.092 seconds