If it's either, it's a router considering the steps that need be taken to
accomplish the attack and sniff information that the client is
sending/receiving from outside the network.
 
But w/e... you are just being flippant now anyway. Enjoy.

-----Original Message-----
From: Dave Watts [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 03, 2006 10:44 PM
To: CF-Talk
Subject: RE: Break it down for n00bs: security problems of non-SSL intrane
t?

> A MItM attack is more or less making your self the router... 
> not a proxy.

I don't think that's correct. Routers separate networks, and forward traffic
from one network to another, not from one host to another. And, for what
it's worth, most of the "Mallory" tools I've seen are called proxies.

> I never said anything about sending a user to any site other 
> than the real one. Sorry, I don't know where you get that from.

If you send a user to your proxy instead of letting the user communicate
directly to the site, you are sending the user to a site other than the real
one.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized
instruction at our training centers in Washington DC, Atlanta,
Chicago, Baltimore, Northern Virginia, or on-site at your location.
Visit http://training.figleaf.com/ for more information!



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Introducing the Fusion Authority Quarterly Update. 80 pages of hard-hitting,
up-to-date ColdFusion information by your peers, delivered to your door four 
times a year.
http://www.fusionauthority.com/quarterly

Archive: 
http://www.houseoffusion.com/groups/CF-Talk/message.cfm/messageid:255312
Subscription: http://www.houseoffusion.com/groups/CF-Talk/subscribe.cfm
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4

Reply via email to