On Mon, 3 Jul 2000, Christian ALT wrote:
> Trojan behind a firewall can diffuse information to IRC channels(Chat).
> Where hackers are quietly waiting for information the trojan gathers in the
> internal network. They can enter the company network through E-mail, CDs,
> floppy disks, Remote Accesses, mobile users Laptops.Here is a sample of what we
>detected with FIrewall-1.
You can also use snort to capture the chats on the IRC
channels. I configure snort to do an ASCII dump of all
traffic on 6667. Always interesting reading to see what
the badguys are up to :)
lance
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================