Security Basics mailing list archives

Re: Sniffing emails - how?


From: Jonathan Kline <klinej () msoe edu>
Date: Mon, 15 Nov 2004 20:41:16 -0600

Incorrect thinking dude. You could do this more or less for any domain
on the internet. With out thinking too hard about it, I can think of
several ways to do it: playing DNS tricks, trying to advertise a new
route to the domains mx handler, and I am sure there are plenty of other
methods.

In brief, clear text == bad! Emailing passwords in cleartext == very
bad.

Cheers,
~J

On Sat, 2004-11-13 at 10:50 +0800, Derek Fountain wrote:
Reading the archives of this and other lists, I occasionally come across 
quotes like this (from the WebApp list in this case):

"2/ That sending a user's password in clear text over email systems is a 
secure method; inappropriate for most sites. For example, an attacker could 
provoke the password recovery procedure for his colleague and sniff the email 
containing the password with relative ease."

Am I correct in thinking that this is only a real problem when an attacker has 
access to the same network as the email recipient? Or is this kind of 
sniffing possible across the internet in general?
-- 
Jonathan Kline <klinej () msoe edu>
Milwaukee School of Engineering

Attachment: signature.asc
Description: This is a digitally signed message part


Current thread: