Bill East on 24 Dec 2008 13:59:16 -0800 |
On 12/24/08, Toby DiPasquale <toby@cbcg.net> wrote:
2. While DNS spoofing is somewhat possible, IP spoofing is difficult I'll add in, if you are on the road you could be at risk. An attacker spoofing a legitimate Wifi point (or simply leaving an open network in a tempting location, like close to a Star$s) can allow all traffic to pass through except for FooBank Ltd., this traffic gets routed to the attacker's phishing site (his network, his DNS). As far as SSL MITM, I saw a couple years back where the fraudster directed victims to "click on our secured link" - said link of course was not https; the attacker simply put a graphic of the IE "lock" icon on the bottom of his page. It took me one or two looks to figure out what was wrong with it, the first time. In short, your real-world exposure to this particular attack is very I agree with you there. Criminals go for low-hanging fruit first. ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug
|
|