I think that we could probably come up with thousands of different ways
to compromise the security of an internal network. What about actually
securing it? One of the easiest things that I have seen done was
impliment an IPSec-based LAN. The setup was simple.

>From the outside in:

router -> firewall -> FreeS/WAN gateway -> encrypted traffic to LAN.

Each machine on the LAN had  it's own keypair that was registered with
the gateway, so when a desktop was fired up, it would authenticate
itself to the gateway, and it was then free to communicate with anyone.
Anyone that was able to sniff the traffic just got encrypted streams. If
you could get a system onto the network, it would be useless unless the
gateway was compromised to accept a bogus key.

C-Ya,
Kenny
 
On Thu, 2002-08-01 at 22:32, Tom Buskey wrote:
> 
> I'd think an old 386 would be alot less noticable and more disposable.
> 
> Heck, how about a floppy based system?  Go up to an existing machine
> already running on a friday afternoon and boot.  If it's a floppy, have
> it erase itself after it boots.  It'd probably run undetected until
> monday morning.
> 
> "Kenneth E. Lussier" said:
> >So, basically, be suspicious if anyone brings in a gaming console and
> >sets it up in the breakroom.
> >
> >My favorite quote form this was:
> >
> >"Most organizations focus on the perimeter," said Davis. "Once you get
> >through the outside,  there's a soft chewy center."
> >
> >Not a bad read. A little light on the details, and you can't really
> >dance to it, so I'd give it a 7.3 ;-)
> >
> >C-Ya,
> >Kenny
> > 
> >On Thu, 2002-08-01 at 13:20, [EMAIL PROTECTED] wrote:
> >> 
> >> We're behind a firewall.  We're safe!
> >> 
> >>    http://online.securityfocus.com/news/558
> >> 
> >> Think again! (not that we haven't said *that* before either ;)
> >> -- 
> >> 
> >> Seeya,
> >> Paul
> >> 
> >> 
> >> 
> >> *****************************************************************
> >> To unsubscribe from this list, send mail to [EMAIL PROTECTED]
> >> with the text 'unsubscribe gnhlug' in the message body.
> >> *****************************************************************
> >-- 
> >----------------------------------------------------------------------------
> >"Tact is just *not* saying true stuff" -- Cordelia Chase
> >
> >Kenneth E. Lussier
> >Sr. Systems Administrator
> >Zuken, USA
> >PGP KeyID CB254DD0 
> >http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xCB254DD0
> >
> >
> >
> >*****************************************************************
> >To unsubscribe from this list, send mail to [EMAIL PROTECTED]
> >with the text 'unsubscribe gnhlug' in the message body.
> >*****************************************************************
> >
> 
> -- 
> -------
> Tom Buskey
> 
> 
> 
> *****************************************************************
> To unsubscribe from this list, send mail to [EMAIL PROTECTED]
> with the text 'unsubscribe gnhlug' in the message body.
> *****************************************************************
-- 
----------------------------------------------------------------------------
"Tact is just *not* saying true stuff" -- Cordelia Chase

Kenneth E. Lussier
Sr. Systems Administrator
Zuken, USA
PGP KeyID CB254DD0 
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xCB254DD0



*****************************************************************
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*****************************************************************

Reply via email to