Kyle Burton on Tue, 31 Aug 1999 16:17:25 -0400 (EDT) |
for POP, when you auth to the POP service, your username and password go across the wire in clear text (even if they didn't, there's no protocol there, it'd be open to a replay attack even if you send the crypt'd version). telnet to port 110 (the pop3 port) of your mail server, and actualy talk to it. that exercise will answer all of your questions. if it doesn't, go get the pop3 rfc off the net. k ------------------------------------------------------------------------------ "Success covers a multitude of blunders." -- George Bernard Shaw mortis@voicenet.com http://www.voicenet.com/~mortis ------------------------------------------------------------------------------ On Tue, 31 Aug 1999, Nick R wrote: > Umm, aren't the passwords encrypted? > > > -Laktar, a.k.a. Nick Rosen, laktar.dyndns.org > > > If I Ever Became An Evil Overlord: > 14. The hero is not entitled to a last kiss, a last cigarette, or any other > form of last request. > -- Peter's Evil Overlord List, > http://www.eviloverlord.com/lists/overlord.html > > > >From: "Jason S." <jason@sn.com> > >Reply-To: plug@lists.nothinbut.net > >To: plug@lists.nothinbut.net > >Subject: Re: [Plug] Microsoft Striks Again > >Date: Tue, 31 Aug 1999 15:24:44 -0400 (EDT) > > > >Run a packet sniffer on a box on you local lan with an interface in > >pomisc mode, capture port 110, tcp and jot down everyones > >username/password and read their mail while they retrieve it. > > > >Its not overly hard in that situation. POP, and SMTP are clear text, > >and wide open for sniffing. > > > >J. > > > >When I grow up, I wanna be more like me. > >I had a clue. I didn't like it. I took it back and exchanged it for an > >attitude. > > > >On Tue, 31 Aug 1999, Nick R wrote: > > > > > Outside of social engineering and brute force crack attempts how's this > >so > > > w/ POP3? > > > > > > > > > >From: Morgan Wajda-Levie <mpwl@locke.ccil.org> > > > >Reply-To: plug@lists.nothinbut.net > > > >To: plug@lists.nothinbut.net > > > >Subject: Re: [Plug] Microsoft Striks Again > > > >Date: Tue, 31 Aug 1999 07:12:16 -0500 > > > > > > > >On Mon, Aug 30, 1999 at 10:20:02PM -0400, Andy Bradley wrote: > > > > > http://www.cnn.com/TECH/computing/9908/30/hotmail.06/ > > > > > > > >The only problem I have with this and a lot of other coverage of the > > > >cracking is that it makes the assumption that e-mail normally is > > > >secure. The hotmail cracking makes things a lot easier, but reading > > > >other people's e-mail is still a juvenile task, as is faking their > > > >address. That's what pgp is for. > > > > > > > >-- > > > >Morgan Wajda-Levie > > > >http://www.worldaxes.com/wajdalev > > > >PGP fingerprint: > > > >A353 C750 660E D8B6 5616 F4D8 7771 DD21 7BF6 221C > > > >http://www.worldaxes.com/wajdalev/public.asc for PGP key > > > >encrypted mail preferred > > > ><< attach3 >> > > > > > > ______________________________________________________ > > > Get Your Private, Free Email at http://www.hotmail.com > > > > > > _______________________________________________ > > > Plug maillist - Plug@lists.nothinbut.net > > > http://lists.nothinbut.net/mail/listinfo/plug > > > > > > > > >_______________________________________________ > >Plug maillist - Plug@lists.nothinbut.net > >http://lists.nothinbut.net/mail/listinfo/plug > > ______________________________________________________ > Get Your Private, Free Email at http://www.hotmail.com > > _______________________________________________ > Plug maillist - Plug@lists.nothinbut.net > http://lists.nothinbut.net/mail/listinfo/plug > _______________________________________________ Plug maillist - Plug@lists.nothinbut.net http://lists.nothinbut.net/mail/listinfo/plug
|
|