Kyle Burton on Tue, 31 Aug 1999 16:17:25 -0400 (EDT)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [Plug] Microsoft Striks Again


for POP, when you auth to the POP service, your username and password
go across the wire in clear text (even if they didn't, there's no protocol
there, it'd be open to a replay attack even if you send the crypt'd version).


telnet to port 110 (the pop3 port) of your mail server, and actualy talk
to it.

that exercise will answer all of your questions.  if it doesn't, go get the
pop3 rfc off the net.

k




------------------------------------------------------------------------------
"Success covers a multitude of blunders." 
    -- George Bernard Shaw
mortis@voicenet.com                            http://www.voicenet.com/~mortis
------------------------------------------------------------------------------

On Tue, 31 Aug 1999, Nick R wrote:

> Umm, aren't the passwords encrypted?
> 
> 
>         -Laktar, a.k.a. Nick Rosen, laktar.dyndns.org
> 
> 
> If I Ever Became An Evil Overlord:
> 14. The hero is not entitled to a last kiss, a last cigarette, or any other
> form of last request.
>         -- Peter's Evil Overlord List, 
> http://www.eviloverlord.com/lists/overlord.html
> 
> 
> >From: "Jason S." <jason@sn.com>
> >Reply-To: plug@lists.nothinbut.net
> >To: plug@lists.nothinbut.net
> >Subject: Re: [Plug] Microsoft Striks Again
> >Date: Tue, 31 Aug 1999 15:24:44 -0400 (EDT)
> >
> >Run a packet sniffer on a box on you local lan with an interface in
> >pomisc mode, capture port 110, tcp and jot down everyones
> >username/password and read their mail while they retrieve it.
> >
> >Its not overly hard in that situation. POP, and SMTP are clear text,
> >and wide open for sniffing.
> >
> >J.
> >
> >When I grow up, I wanna be more like me.
> >I had a clue. I didn't like it. I took it back and exchanged it for an
> >attitude.
> >
> >On Tue, 31 Aug 1999, Nick R wrote:
> >
> > > Outside of social engineering and brute force crack attempts how's this 
> >so
> > > w/ POP3?
> > >
> > >
> > > >From: Morgan Wajda-Levie <mpwl@locke.ccil.org>
> > > >Reply-To: plug@lists.nothinbut.net
> > > >To: plug@lists.nothinbut.net
> > > >Subject: Re: [Plug] Microsoft Striks Again
> > > >Date: Tue, 31 Aug 1999 07:12:16 -0500
> > > >
> > > >On Mon, Aug 30, 1999 at 10:20:02PM -0400, Andy Bradley wrote:
> > > > > http://www.cnn.com/TECH/computing/9908/30/hotmail.06/
> > > >
> > > >The only problem I have with this and a lot of other coverage of the
> > > >cracking is that it makes the assumption that e-mail normally is
> > > >secure.  The hotmail cracking makes things a lot easier, but reading
> > > >other people's e-mail is still a juvenile task, as is faking their
> > > >address.  That's what pgp is for.
> > > >
> > > >--
> > > >Morgan Wajda-Levie
> > > >http://www.worldaxes.com/wajdalev
> > > >PGP fingerprint:
> > > >A353 C750 660E D8B6 5616  F4D8 7771 DD21 7BF6 221C
> > > >http://www.worldaxes.com/wajdalev/public.asc for PGP key
> > > >encrypted mail preferred
> > > ><< attach3 >>
> > >
> > > ______________________________________________________
> > > Get Your Private, Free Email at http://www.hotmail.com
> > >
> > > _______________________________________________
> > > Plug maillist  -  Plug@lists.nothinbut.net
> > > http://lists.nothinbut.net/mail/listinfo/plug
> > >
> >
> >
> >_______________________________________________
> >Plug maillist  -  Plug@lists.nothinbut.net
> >http://lists.nothinbut.net/mail/listinfo/plug
> 
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com
> 
> _______________________________________________
> Plug maillist  -  Plug@lists.nothinbut.net
> http://lists.nothinbut.net/mail/listinfo/plug
> 


_______________________________________________
Plug maillist  -  Plug@lists.nothinbut.net
http://lists.nothinbut.net/mail/listinfo/plug