Penetration Testing mailing list archives

Re: RES: Instant Messenger


From: RSnake <rsnake () shocking com>
Date: Sun, 5 Sep 2004 12:49:49 -0700 (PDT)


        On the flip side I wrote a short paper on bypassing content filters by
sending Trillian Pro messages over SSH.  It's a tad off topic, but still
relevant: http://www.shocking.com/~rsnake/trillianremote.html

On Fri, 3 Sep 2004, Alexandre Cezar wrote:

| Date: Fri, 3 Sep 2004 11:42:31 -0300
| From: Alexandre Cezar <acezar () opencs com br>
| To: Ido Rosen <ido () cs uchicago edu>,
|      "Murtland, Jerry" <MurtlandJ () Grangeinsurance com>
| Cc: pen-test () securityfocus com, webappsec () securityfocus com,
|      full-disclosure () lists netsys com
| Subject: RES: Instant Messenger
|
| Take a look at http://www.akonix.com for securing IM communication and
| I recommend this paper
| www.giac.org/practical/GSEC/Frank_Reiss_GSEC.pdf
|
|
| Regards
| -----Mensagem original-----
| De: Ido Rosen [mailto:ido () cs uchicago edu]
| Enviada em: quinta-feira, 2 de setembro de 2004 23:17
| Para: Murtland, Jerry
| Cc: pen-test () securityfocus com; webappsec () securityfocus com;
| full-disclosure () lists netsys com
| Assunto: Re: Instant Messenger
|
| Jabber.
|
| On Thu, 2 Sep 2004 10:00:18 -0400
| "Murtland, Jerry" <MurtlandJ () Grangeinsurance com> wrote:
|
| > I am looking for white papers on enterprise Instant Messenger security
| > concerns.  It doesn't have to be, but anything on MSN IM would be
| > helpful too.  Does anyone have any good resources to share?
| >
| > Jerry J. Murtland
| >
| >
| >
|
|
| --
| +-------------------------------------------------+
| |  Email : ido () ieee org / ido () cs uchicago edu     |
| | Jabber : phaedo () jabber org                      |
| |    PGP : http://www.dork.com/ido                |
| +-------------------------------------------------+
|

-R

The information in this email is confidential and may be legally
privileged.  It is intended solely for the addressee.  Access to
this email by anyone else is unauthorized.  If you are not the
intended recipient, any disclosure, copying, distribution or any
action taken or omitted to be taken in reliance on it is
expressly prohibited and may be unlawful.

------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------


Current thread: