Penetration Testing mailing list archives

Re: How to pentest Skype?


From: Cedric Blancher <blancher () cartel-securite fr>
Date: Mon, 19 Jun 2006 15:39:41 +0200

Le dimanche 18 juin 2006 à 20:33 +0200, Nicolas RUFF a écrit :
On the other hand, tricking someone to make a Skype call using the
aforementionned vulnerability can be very dangerous, for you can
establish full remote control of a PC through various Skype plugins. The
plugin (.DLL) must have been installed on the victim's computer, though.

Based on that, and some ideas you had presented before (thx) :

        http://sid.rstack.org/pres/0606_Recon_Skype_Botnet.pdf


-- 
http://sid.rstack.org/
PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE
Hi! I'm your friendly neighbourhood signature virus.
Copy me to your signature file and help me spread!

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: