Security Basics mailing list archives
Re: Clear text password vulnerability
From: Twofish -lists <twofish-lists () terra es>
Date: Mon, 14 Feb 2005 22:14:35 +0100
Hi, I've been using a web based mail service for sometime. Yesterday I was trying to figure out how the packet exchange occurs between the client and the server by sniffing it. I wanted to know the forking off to different servers for authentication purposes. However, I noticed that the client side would send the password in clear text along with the username.
Welcome to real world. POP3, SMTP does also.
It uses a POST method for this. I think this is a big vulnerability in the mail service.
I wanted your opinion if I should term this as a vulnerability or not and whether there is an exploit for this or not.
It's not a vulnerability. It's a lack of knowledge in the implementation. There have been sniffers since the invention of computers.
Also one of my friend adviced me to try and charge money for figuring out this vulnerability. Should I go ahead with contacting the sys admin for that ? also is there an exploit that i can point out to the admin that can be used against them...
exploit???? I think you should read a little more before asking such a basic thing. Ask your sysadmin to use ssl. Learn a moreon tcp/ip tools and basics.
As far as i know..this clear text pwd can be exploited only for the = users in same LAN. Is there any thing else that I can point out to the admin Thanks, Harshil Parikh
Current thread:
- Clear text password vulnerability Harshil Parikh (Feb 14)
- Re: Clear text password vulnerability Twofish -lists (Feb 14)
- Re: Clear text password vulnerability Kevin Conaway (Feb 14)
- Re: Clear text password vulnerability Gautam R. Singh (Feb 15)
- <Possible follow-ups>
- RE: Clear text password vulnerability Ken Hamaker (Feb 14)
- RE: Clear text password vulnerability adisegna (Feb 14)