Uh-oh...

Duston, Hal hdusto01 at sprintspectrum.com
Fri Mar 23 16:55:35 CST 2001


Or the IP-tunnelling-through-email hack.

http://www.google.com/search?q=%22tcp%2Fip+over+email%22

Covert channels can probably never really be shut down.
(And still do anything useful)

Hal

Mike Coleman [mkc at mathdogs.com] wrote:
> 
> "Jeremy Fowler" <jeremy at microlink.net> writes:
> > Backorifice has various encryption plugins that encrypt 
> > the data packets, couple those with STCPIO which encrypts 
> > the header and most firewalls wouldn't be able to identify 
> > that packet as a backorifice packet. The only real 
> > solution is to limit what ports a PC has access to on 
> > the Internet, use a proxy server for web browsing, and 
> > use NAT to separate the network PCs from the outside world.
> 
> Even this, though, will not stop a determined effort.  (Check 
> out the IP-over-DNS hack, for example.)
> 
> Keeping your information private is becoming as difficult 
> as keeping your germs to yourself.  If everything you touch 
> or pass close to is a potentialvector, your options are 
> pretty limited.
> 
> --Mike
> 
> -- 
> Mike Coleman, mkc at mathdogs.com
>   http://www.mathdogs.com -- problem solving, expert software 
> development




More information about the Kclug mailing list