Post-it notes with passwords are going to be pretty hard to stop. Sniffing a
connection for a plain text password will do it too. Encryption can protect
against some of this. VPN can help to I would guess.
-----Original Message-----
From: Ben Keepper [SMTP:[EMAIL PROTECTED]]
Sent: Thursday, June 03, 1999 10:01 PM
To: [EMAIL PROTECTED]
Subject: Fw: 'Snarfing'
----- Original Message -----
From: Ben Keepper <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, June 02, 1999 6:54 PM
Subject: 'Snarfing'
> "Snarfing"
>
> Not sure if this is the correct term, but I've heard it several
times of
> late. It seems to refer to the ability to take control of a
session from
> someone else and essentially spoof their identity.
>
> How do "attackers" monitor these sessions and what tools do they
use to
> monitor and take control?
>
> Is this "attack" a danger only to certain protocols?
>
> What are the defenses against this attack?
>
> Any discussion is appreciated.
>
> Ben
>
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]