On Mon, 3 Jul 2000, Christian ALT wrote:

> Trojan behind a firewall can diffuse information to IRC channels(Chat).
> Where hackers are quietly waiting for information the trojan gathers in the
> internal network. They can enter the company network through E-mail, CDs,
> floppy disks, Remote Accesses, mobile users Laptops.Here is a sample of what we 
>detected with FIrewall-1.

You can also use snort to capture the chats on the IRC
channels.  I configure snort to do an ASCII dump of all
traffic on 6667.  Always interesting reading to see what
the badguys are up to :)

lance



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to