Security Basics mailing list archives

Re: How to obtain a yahoo username off a computer


From: "Times Enemy" <securityfocus () krr org>
Date: Wed, 11 Jun 2003 22:18:55 -0700 (MST)

Greets.

There's been a variety of helpful responses to the original request
now.
  There are good reasons for doing what he wants to do, but (and I'm
in no way impuning the original poster by asking this) there are some
crummy  reasons as well.

How do any of you know this isn't part of a stalking, or background
info for more social engineering, or yada? Near as I know, you don't.
Sure, this is worst case scenario, but isn't paranoia part of the
game?

Most of the responses were rather no-brainers.  If the responses here
were enough to teach a stalker, social engineer, or yada, their trade
... well, at this level of the game they probably aren't too much of a
threat.  If the company wants to strike before the threat truly
exists, then they need to upgrade their knowledge of networks and
possibly computers in general a wee bit more.

T'is true though, that the list doesn't know a particular members
motives.  I am curious though, to know, an effective and workable method
for identifying stalkers, social engineers, and yada vs. valid on the
up-and-up do-gooders.  What say ye?

Haha, i must admit though, that i do find it humorous that someone with
the authority to use various sniffers and make network configuration
modifications would not think to use sniffers, or would not know how to
go from 0% to 90% but be stuck after gathering so much intel.  I find
weeding that first 10% to be much more difficult, technically, than the
remaining 90%.

And just for kicks, since the yahooligan is ninety percent id'ed, why
not just walk up to them, and say, "Hey, stop using Yahoo, at work."  If
that doesn't work, draw the line, notify THE Powers that Be, and tell
the yahooligan, "The company does not want to waste it's money recording
everything you do with it's resources, so, i am telling you once again,
stop using Yahoo, at work.  Continueing to do so, will be forcing the
company to take the next step."  Oh, and make sure to look the
yahooligan straight in the peepers and smile the whole time.  :)

If they persist, pull the plug on their box.  That ninety percent of
proof should be enough to have the company behind this.


ciao
.times enemy

-----Original Message-----
To: security-basics () securityfocus com
Subject: How to obtain a yahoo username off a computer

Hello!  We have a security issue and need to know who is using a
particular Yahoo user ID from within our company.  We are about 90%
certain of the person's identity.  This user has been deleting his
cookies and temp Internet files.  We want to search his computer to
see if Yahoo ID xxxx is somewhere on his computer.   We know the
Yahoo user ID - we just need to confirm that this person is using it.
 We don't want to contact Yahoo because we don't want to go down the
legal road needed to get them to release the info.  Any ideas?
Thanks,


--
Curt Seeliger, Data Ranger
CSC, EPA/WED contractor
541/754-4638
seeliger.curt () eqa gov




---------------------------------------------------------------------------
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadrant,
while InStat has confirmed Neoteris as the leader in marketshare.
     
Find out why, and see how you can get plug-n-play secure remote access in
about an hour, with no client, server changes, or ongoing maintenance.
          
Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
----------------------------------------------------------------------------


Current thread: