Penetration Testing mailing list archives

RE: Skype exploitable vulnerabilities and risks pointers


From: "Andrew Blair" <Andrew.Blair () genmills com>
Date: Wed, 12 Jul 2006 16:31:24 -0500

There is also a good paper about how it works at:
http://www1.cs.columbia.edu/~library/TR-repository/reports/reports-2004/
cucs-039-04.pdf

It was written in '04, though so there may be some changes.

-----Original Message-----
From: Gadi Evron [mailto:ge () linuxbox org] 
Sent: Wednesday, July 12, 2006 3:08 AM
To: Serge Vondandamo
Cc: pen-test () securityfocus com; vuln-dev () securityfocus com
Subject: Re: Skype exploitable vulnerabilities and risks pointers

On Wed, 12 Jul 2006, Serge Vondandamo wrote:
Hi,

I am conducting a research for exploitable vulnerabilities in Skype 
and their associated risks to corporate environments.

Any Security concern and how to mitigate them if possible. Skype 
engineers, your constructive inputs are welcome.

Does anybody have some good references, mailing lists, urls or papers 
regarding Skype?

Thanks,
Serge

Best link to start with is this blackhat Europe preso:
http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-biondi/bh-eu
-06-biondi-up.pdf




----------------------------------------------------------------------
--------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the 
Analyst's Choice Award from eWeek. As attacks through web applications

continue to rise, you need to proactively protect your applications 
from hackers. Cenzic has the most comprehensive solutions to meet your

application security penetration testing and vulnerability management 
needs. You have an option to go with a managed service (Cenzic 
ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download 
FREE whitepaper on how a managed service can help you: 
http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm 
your results from other product. Contact us at request () cenzic com for
details.
----------------------------------------------------------------------
--------



------------------------------------------------------------------------
------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the
Analyst's Choice Award from eWeek. As attacks through web applications
continue to rise, you need to proactively protect your applications from
hackers. Cenzic has the most comprehensive solutions to meet your
application security penetration testing and vulnerability management
needs. You have an option to go with a managed service (Cenzic
ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download
FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm
your results from other product. Contact us at request () cenzic com for
details.
------------------------------------------------------------------------
------

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: