Penetration Testing mailing list archives
Re: Political Analysis of Security Products
From: "Kurt Seifried" <bugtraq () seifried net>
Date: Tue, 5 Feb 2002 12:15:46 -0700
Open port, to accept packets? No. It's a firewall. Hint: it already sees all the network traffic. You can easily add a backdoor to a product like that to (for exmaple) take ICMP packets of a special type not often used (say type 40) and if they meet a special checksum/md5hash with secret you decrupt the contents and carry out those instructions. There are some examples of this, icmp backdoors, and the like for various UNIX systems. The only way to find stuff like this is a source code audit. Kurt Seifried, kurt () seifried org A15B BEE5 B391 B9AD B0EF AEB0 AD63 0B4E AD56 E574 http://seifried.org/security/ ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
Current thread:
- Political Analysis of Security Products pentestlist (Feb 05)
- Re: Political Analysis of Security Products William D. Colburn (aka Schlake) (Feb 05)
- Re: Political Analysis of Security Products R. DuFresne (Feb 05)
- Re: Political Analysis of Security Products ed (Feb 05)
- Re: Political Analysis of Security Products Kurt Seifried (Feb 05)
- Re: Political Analysis of Security Products E (Feb 06)
- Re: Political Analysis of Security Products Charles 'core' Stevenson (Feb 05)
- Re: Political Analysis of Security Products Rainer Duffner (Feb 05)
- Re: Political Analysis of Security Products Patrick Oonk (Feb 06)
- Re: Political Analysis of Security Products yossarian (Feb 05)
- <Possible follow-ups>
- RE: Political Analysis of Security Products Brass, Phil (ISS Atlanta) (Feb 05)
- RE: Political Analysis of Security Products Moonen, Ralph (Feb 06)