watch Moxie's talk http://www.defcon.org/html/links/dc-archives/dc-17-archive.html#Marlinspike
I believe that is the best method. Though being a sysadmin myself I think your safe from your sysadmin unless you pissed them off or they have a reason to be monitoring you. preforming a wide spread MiTM attack on a corporate network they are administrating is asking for trouble. -Brad On Mon, Dec 14, 2009 at 3:30 PM, Shawn McGovern <[email protected]>wrote: > Ok so my question was posted in a forum and someone gave me and answer but > didnt explain it and then the forum post was when closed on me. So I will > ask here for clarity and try not to kill me for this, I am trying to learn. > > So if someone uses a corporate network to check a Gmail (using SSL). If > they check to make sure that they have a secure connection -- once connected > -- and then they check the certificate to see if the cert hierarchy has been > tampered with. Everything looks fine. Are any admin or whomever able to > see you emails? Forget about software on the computer you are using, only > through the network monitoring. > > I was told in the forum that they could use a monitoring program like > wireshark to view them. In the wireshark forum I read that you would need > the private key to decrypt the messages and in the forum they said that a > sys admin can get the private key? Is that information correct? and if so > how would they be able to get the private key? > > > Thanks in advance > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com >
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
