three months late.....

Carric Dooley wrote:
> 
> Taking over a session is "hijacking".  The only time I have seen the term
> "snarfing" is when it was in reference to getting the password file off of
> unix box "snarfing the unix passwd file".
> 
> the best session hijacking tool I have seen to date is hunt.  It  used to
> be on the trinux tools page.  You may still be able to find it at
> opensec.net.  Hunt only seems to be aware of telnet sessions, and the only
> real defense is using an encrypted substitute (i.e. ssh).

Or a switched network.

> 
> Carric Dooley
> COM2:Interactive Media
> http://www.com2usa.com
> 
> On Wed, 2 Jun 1999, Ben Keepper wrote:
> 
> > "Snarfing"
> >
> > Not sure if this is the correct term, but I've heard it several times of
> > late.  It seems to refer to the ability to take control of a session from
> > someone else and essentially spoof their identity.
> >
> > How do "attackers" monitor these sessions and what tools do they use to
> > monitor and take control?
> >
> > Is this "attack" a danger only to certain protocols?
> >
> > What are the defenses against this attack?
> >
> > Any discussion is appreciated.
> >
> > Ben
> >
> > -
> > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > "unsubscribe firewalls" in the body of the message.]
> >
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]

-- 
--Paul Hessels
--Systems Analyst Student
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to