Always put in positive checks if your system is sensitive and you are
exposed to potentially hostile network environments.

It is possible for someone with the right tools (and you can download them
:-( ) to subvert inter-host authorisation at the TCP Network level.

Port blockers and spoofed TCP packet credentials are just part of the
game...... S.A.T.A.N. was just the first of a set of tools that have been
developed for legitimate purposes and misused. Later tools were deliberately
crafted. Once a "trust" is set up between two systems or networks you are
potentially vulnerable. If you *have* to sue trusted relationships I am sure
you use separate physical networks and IP filtering. Don't you ?

B.T.W. System Auditing Tool for Analysing Networks

Regards and let's just be safe out there............

JayJay
-------
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/

Reply via email to