Bugtraq mailing list archives
Re: Hijacking tool
From: econrad () bu edu (Eric Conrad)
Date: Tue, 24 Jan 1995 11:37:28 -0500 (EST)
I'm less concerned about the IP spoofing attack method than I am curious about this TAP tool. Does anyone have any detailed/technical information on this in particular?
I don't think this is anything special to be worried about. Once someone has root, they can use this tool to clone ttys and break into more systems. The way I look at it, once the hacker has root, the gig is up anyways. The measures described to prevent this (disabling loadable kernel modules) seem pointless -- if the attackers have root, they can rebuild the kernel to do anything they want. I found tap via archie -- search for tap-1.24. It may be an older version. ...Eric
Current thread:
- Hijacking tool Christopher Klaus (May 10)
- Re: Hijacking tool Paul Ferguson (Jan 24)
- Re: Hijacking tool Casper Dik (Jan 24)
- Re: Hijacking tool Alec Muffett (Jan 24)
- Re: Hijacking tool Alan Hannan (Jan 24)
- Re: Hijacking tool bmanning () isi edu (Jan 24)
- Re: Hijacking tool Scott D. Yelich (Jan 25)
- Re: Hijacking tool Casper Dik (Jan 24)
- Re: Hijacking tool Paul Ferguson (Jan 24)
- Re: Hijacking tool Oliver Friedrichs (Jan 24)
- Re: Hijacking tool Oliver Friedrichs (Jan 24)
- Re: Hijacking tool Eric Conrad (Jan 24)
- Re: Hijacking tool Jim Duncan (Jan 24)
- Re: Hijacking tool John Evans (Jan 24)
- <Possible follow-ups>
- Re: Hijacking tool jim () Tadpole COM (Jan 23)
- Re: Hijacking tool Darren Reed (Jan 23)
- CIAC Advisory F-08: IP Address Spoofing and Hijacked Session Attacks (fwd) Mark Crother (Jan 23)
- Re: Hijacking tool Patrick Horgan (Jan 23)
- Re: Hijacking tool der Mouse (Jan 24)
- Anti Hijacking tools Pete Shipley (Jan 27)
- Re: Anti Hijacking tools jsz (Jan 28)
- Re: Anti Hijacking tools Karl Strickland (Jan 28)
- Anti Hijacking tools Pete Shipley (Jan 27)