From: Curt Purdy (purdy@tecman.com)
Date: Mon Jul 31 2006 - 18:39:41 EDT
Dotzero wrote:
> User A at IP address 172.16.1.1 connects to a remote host foo.com
> using telnet by entering "telnet foo.com" from a command prompt which
> would normally connect to 192.168.1.1 (using RFC 1918 addresses rather
> than real ones).
>
> Evil person B has access to a router that is in the path between user
> A and the telnet server for foo.com. Evil person B sets up a span port
> and sniffs traffic to his hearts content....including the telnet
> session. Note that evil person B is not on the same network segment as
> either of the endpoints. Obviously, this is a simplified and contrived
> example that ignores asymetric routing, etc.
<snip>
Which is why I require all users to use only SSH with no port 23 allowed at
router.
Curt Purdy CISSP, GSNA, GSEC, CNE, MCSE+I, CCDA
Information Security Officer
Information Systems Security
infosysec.net
443.846.4231
-------------
If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity czar Richard Clarke
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:29 EDT