[[EMAIL PROTECTED]] Fri, Jul 12, 2002 at 01:08:05PM -0400 wrote:
> None of the stuff you mentioned is specific to IRC.......I understand that unless I 
>seal the computer in concrete and throw it off a boat into the Mariana Trench that 
>it's not ever totally secure......I just wondered if IRC made the machine less 
>secure....and from the sounds of it....it doesn't seem the make the machine any less 
>secure than your "average" internet communication APP...... 
> 

   Well, I guess IRC itself woudn't make your machine any less secure. But only when 
you use it does
it open the possiblilities.

- nocon
 
> -----Original Message-----
> From: noconflic [mailto:[EMAIL PROTECTED]]
> Sent: Friday, July 12, 2002 12:08 PM
> To: Teodorski, Chris
> Cc: 'Cheryl Goh'; [EMAIL PROTECTED]
> Subject: Re: security question
> 
> 
> [[EMAIL PROTECTED]] Fri, Jul 12, 2002 at 10:16:53AM -0400 wrote:
> > Why is IRC considered such a security risk?   I have heard people discussing IRC 
>like it was made by the devil himself.  Can anyone provide me with some insight into 
>this.  For the sake of discussion, let's assume that DCC is NOT set to Auto Get.....
> 
> 
>   Well, The first thing that comes to mind is BufferOverruns of some sorts, within 
>the client itself. 
> but lets assume that the client is not vulnerable to any known Bugs/Exploits. 
>Depending on how you
> are connected to the IRC network itself, you run the risk of exposing your 
>connecting IP/ISP. Now assuming
> of course your PC is 100% up to date with all the latest security patches, How about 
>when somone posts 
> /sends a interesting URL to the channel and you click on it out of curiosity, this 
>will open your 
> browser to a potental malicious ( broad term ) site, what i mean is that it solely 
>gathers information. 
> ( IP,ISP,Connection, DNS, etc.. Now instead of attacking your machine directly, the 
>bad guy decides 
> go for your ISP's DNS server, is able to compromise it, modify's the DNS info for 
>the mail servers to 
> point to malicious POP server soly to collect e-mail/passwords, etc... hell, not 
>even that, how about 
> a little social engineering calling your ISP pretending to be you or get info about 
>you "This IP was attacking 
> me here's the (falsified) logs."  or mabee just grabbing access to the telco itself, 
>The possibilities are 
> only limited to the imagination of the attacker.  Basicly as stated before, athough 
>Your machine may be 
> 100% secure, when you connect to the outside world is when you open the doors to 
>endless 
> attacks/vulnerabilities.
> 
> -nocon

Reply via email to