Penetration Testing mailing list archives
RE: IRC protocols and insecurity
From: "Todd Towles" <toddtowles () brookshires com>
Date: Thu, 9 Sep 2004 15:45:04 -0500
Agreed, AV on all workstations with centralized updating. -----Original Message----- From: Jose Maria Lopez [mailto:jkerouac () bgsec com] Sent: Thursday, September 09, 2004 11:41 AM To: pen-test () securityfocus com Subject: Re: IRC protocols and insecurity El lun, 06 de 09 de 2004 a las 15:00, proc ps escribió:
Hello, I've been looking for any white papers that describe the security/technical aspects of the IRC protocol, but so far just found mIRC exploits and insecurities.
Nessus check for some vulnerabilities in the ircd daemon, but I don't know if that suits you in any way.
I'm trying to secure a building network based on an OpenBSD 3.5 server and Win32 clients. As the clients purpose are just for file sharing, email, internet access, instant messaging and some irc usage for the students.
It's quite difficult to secure this kind of network at the server, I better would be looking at the Win32 clients.
How can I secure/scan for virii what the members are downloading via IRC? How about the possibilities of hijacking connections via IRC? What are the threats that can come to this network via the IRC protocol?
The best you can do it's having an antivirus in each Win32 machine, in daemon mode (always loaded), so it can detect any of the virii or worms that users can download via IRC/DCC, email, or file sharing. It's the easiest way to do it, but you can also try to use a corporate antivirus in the server in daemon mode scanning for all the downloads.
Thanks and best regards.
-- Jose Maria Lopez Hernandez Director Tecnico de bgSEC jkerouac () bgsec com bgSEC Seguridad y Consultoria de Sistemas Informaticos http://www.bgsec.com ESPAÑA The only people for me are the mad ones -- the ones who are mad to live, mad to talk, mad to be saved, desirous of everything at the same time, the ones who never yawn or say a commonplace thing, but burn, burn, burn like fabulous yellow Roman candles. -- Jack Kerouac, "On the Road" ------------------------------------------------------------------------------ Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------------- ------------------------------------------------------------------------------ Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html -------------------------------------------------------------------------------
Current thread:
- IRC protocols and insecurity proc ps (Sep 07)
- Re: IRC protocols and insecurity Chris Green (Sep 08)
- Re: IRC protocols and insecurity Jose Maria Lopez (Sep 09)
- Re: IRC protocols and insecurity DokFLeed.Net (Sep 09)
- Re: IRC protocols and insecurity Barrie Dempster (Sep 11)
- Re: IRC protocols and insecurity David Coppa (Sep 14)
- Re: IRC protocols and insecurity Barrie Dempster (Sep 11)
- RE: IRC protocols and insecurity Rob Shein (Sep 13)
- <Possible follow-ups>
- RE: IRC protocols and insecurity Todd Towles (Sep 10)