Vulnerability Development mailing list archives

RE: Comcast man-in-the-middle attack


From: "PIATT, BRET L (PB)" <bp3847 () sbc com>
Date: Fri, 8 Feb 2002 15:05:28 -0800

 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

As far as directing and injecting ads, http://www.frontporch.com has had the
technology since 1998.  They've recently redone their site I'm not sure how
many ISP customers they have right now as the site is pretty vague.

Bret Piatt   | Network Security Engineer II     | CISSP-CCNP-CCDP
SBC DataComm | Advanced Security Services Group | SCNA-RHCE-MCP 


- -----Original Message-----
From: jon schatz [mailto:jon () divisionbyzero com] 
Sent: Friday, February 08, 2002 10:42 AM
To: J Edgar Hoover
Cc: vuln-dev () securityfocus com; bugtraq () securityfocus com
Subject: Re: Comcast man-in-the-middle attack

<snip>

This allows them to monitor and change (or insert ads into) what you 
read.

It most certainly does. How do you know that they aren't already? They
probably aren't though, because as of 6 months ago, none of the major
players had the ability to insert content into requests. (more on this
later). 

<snip>

- -jon

- -- 
jon () divisionbyzero com || www.divisionbyzero.com
gpg key: www.divisionbyzero.com/pubkey.asc
think i have a virus?: www.divisionbyzero.com/pgp.html
"You are in a twisty little maze of Sendmail rules, all confusing." 

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0

iQA/AwUBPGRZbF+IxmqPU329EQIYUwCcCuRScXfXTybH6PyeGDoyh1KOmEoAoKJs
zv78mSzclEVEgFAvBpHVToHM
=nT4W
-----END PGP SIGNATURE-----


Current thread: