Uh-oh...
Duston, Hal
hdusto01 at sprintspectrum.com
Fri Mar 23 16:55:35 CST 2001
Or the IP-tunnelling-through-email hack.
http://www.google.com/search?q=%22tcp%2Fip+over+email%22
Covert channels can probably never really be shut down.
(And still do anything useful)
Hal
Mike Coleman [mkc at mathdogs.com] wrote:
>
> "Jeremy Fowler" <jeremy at microlink.net> writes:
> > Backorifice has various encryption plugins that encrypt
> > the data packets, couple those with STCPIO which encrypts
> > the header and most firewalls wouldn't be able to identify
> > that packet as a backorifice packet. The only real
> > solution is to limit what ports a PC has access to on
> > the Internet, use a proxy server for web browsing, and
> > use NAT to separate the network PCs from the outside world.
>
> Even this, though, will not stop a determined effort. (Check
> out the IP-over-DNS hack, for example.)
>
> Keeping your information private is becoming as difficult
> as keeping your germs to yourself. If everything you touch
> or pass close to is a potentialvector, your options are
> pretty limited.
>
> --Mike
>
> --
> Mike Coleman, mkc at mathdogs.com
> http://www.mathdogs.com -- problem solving, expert software
> development
More information about the Kclug
mailing list