Penetration Testing mailing list archives
Re: Re: Hidden Copying Software
From: mr.nasty () ix netcom com
Date: 25 Jul 2006 14:33:08 -0000
My .02 cents. First of all the Prof's pc is probably left unattended to allow windows of opportunity. Although the prof may lock his PC this won't prevent someone from being able to gather the data. One way a student can do this is if the classroom is on a network and the Prof's pc is not hardened the network will allow access to his pc and he would probably never know a student sitting in his classroom is looking through his pc. Another way would be for a student to set up a script that would copy the entire contents of any usb device pluged into the system. If the Prof's routine is to come to the classroom, plugin his usb drive, open his notes, etc etc. You get the point. Afterwards the students access the unattended machine and gather their loot. If it's an unattended box chances are very low that you'd ever be able to catch the person who set it up. By unattended box I mean one that isn't secure. No password protection, no screen saver, etc. If the box wasn't an unattended box, then you have some pretty smart students and probaby should consider changing their majors. ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- Re: Hidden Copying Software, (continued)
- Re: Hidden Copying Software Maxim Kostyukov (Jul 25)
- Re: Hidden Copying Software jim (Jul 25)
- Re: Hidden Copying Software Nicolas RUFF (Jul 25)
- Re: Hidden Copying Software killy (Jul 25)
- RE: Hidden Copying Software Shenk, Jerry A (Jul 24)
- RE: Hidden Copying Software R. DuFresne (Jul 24)
- RE: Hidden Copying Software Neil Moore (Jul 25)
- RE: Hidden Copying Software R. DuFresne (Jul 24)
- RE: Hidden Copying Software Kish Pent (Jul 24)
- Re: Hidden Copying Software Benny Herlambang (Jul 24)
- RE: Hidden Copying Software terry (Jul 25)
- Re: Hidden Copying Software Benny Herlambang (Jul 24)
- Re: Re: Hidden Copying Software mr . nasty (Jul 25)