Penetration Testing mailing list archives
Re: Boot floppy
From: "Morning Wood" <se_cur_ity () hotmail com>
Date: Fri, 13 Apr 2007 12:03:46 -0700
here is where an ARP / MITM attack, combined with DNS redirection to a browser exploit comes in handy. He does use your companies network doesnt he? With this technique you can also spy on his traffic, user / pass combos etc. As far as getting a trojan on... less than 10 seconds are required if hosted on a website, simply open browser, type url, select "open" close browser, walk away. As an employer, you control your network, and may spy at will. Consider also going to his residence and scan for wireless... seems odd your jumping through alot of hoops here... M. Wood ------------------------------------------------------------------------ This List Sponsored by: Cenzic Are you using SPI, Watchfire or WhiteHat? Consider getting clear vision with Cenzic See HOW Now with our 20/20 program! http://www.cenzic.com/c/2020 ------------------------------------------------------------------------
Current thread:
- RE: Boot floppy, (continued)
- RE: Boot floppy Pretorius, Wynand (ZA - Johannesburg) (Apr 11)
- Re: Boot floppy Sat Jagat Singh (Apr 11)
- Re: Boot floppy Danyelle Gragsone (Apr 11)
- Re: Boot floppy Jamie Riden (Apr 11)
- Re: Boot floppy Juergen Fiedler (Apr 11)
- RE: Boot floppy Wiedemann, Adrian (Apr 11)
- RE: Boot floppy Mifa (Apr 13)
- Re: Boot floppy Michael Munt (Apr 13)
- RE: Boot floppy Sat Jagat Singh (Apr 13)
- Re: Boot floppy Shreyas Zare (Apr 13)
- Re: Boot floppy Morning Wood (Apr 13)
- Re: Boot floppy Packet Man (Apr 15)
- Re: Boot floppy barcajax (Apr 13)
- Re: Boot floppy Thor (Hammer of God) (Apr 13)
- Re: Boot floppy Tremaine Lea (Apr 14)
- Re: Boot floppy Morning Wood (Apr 15)
- RE: Boot floppy Michele Jordan (Apr 28)
- Re: Boot floppy Tremaine Lea (Apr 14)