lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <001b01c40cf2$3bcd0f50$9d61a8c0@acctys.local> From: yoanne.lemercier at acctys.com (Yoanne LE MERCIER) Subject: malware added in transit Hi list. It's surely possible, but I'm not aware of anything doing so at this time (i'd be interested to see) This kind of malware would be quite specific to be traffic aware (HTTP down/upload, FTP, Net shares...), to be able to understand file transfers negociations and act at the right time... And a one-shot* "real-time" file transfer infection can be seriously "compromised" depending on the protocol being hikacked, packet sizes, multiple files being transferred (?), network problems and much more ... (*) "one-shot" meaning you dont reset any connection side, which would be the most stealthy method. YLM. -----Message d'origine----- De : full-disclosure-admin@...ts.netsys.com [mailto:full-disclosure-admin@...ts.netsys.com]De la part de Paul Envoy? : jeudi 18 mars 2004 13:58 ? : full-disclosure@...ts.netsys.com Objet : [Full-Disclosure] malware added in transit Hi all, perhaps I'm way off-base but I've been under the impression that malware can be added to clean transmissions as they pass through infected nodes. Is this possible? Find local movie times and trailers on Yahoo! Movies.
Powered by blists - more mailing lists