Post-it notes with passwords are going to be pretty hard to stop. Sniffing a
connection for a plain text password will do it too. Encryption can protect
against some of this. VPN can help to I would guess. 

        -----Original Message-----
        From:   Ben Keepper [SMTP:[EMAIL PROTECTED]]
        Sent:   Thursday, June 03, 1999 10:01 PM
        To:     [EMAIL PROTECTED]
        Subject:        Fw: 'Snarfing'


        ----- Original Message ----- 
        From: Ben Keepper <[EMAIL PROTECTED]>
        To: <[EMAIL PROTECTED]>
        Sent: Wednesday, June 02, 1999 6:54 PM
        Subject: 'Snarfing'


        > "Snarfing"
        > 
        > Not sure if this is the correct term, but I've heard it several
times of
        > late.  It seems to refer to the ability to take control of a
session from
        > someone else and essentially spoof their identity.
        > 
        > How do "attackers" monitor these sessions and what tools do they
use to
        > monitor and take control?
        > 
        > Is this "attack" a danger only to certain protocols?
        > 
        > What are the defenses against this attack?
        > 
        > Any discussion is appreciated.
        > 
        > Ben
        > 

        -
        [To unsubscribe, send mail to [EMAIL PROTECTED] with
        "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to