lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <200410150614.i9F6E4Dk013028@cairo.anu.edu.au>
From: avalon at cairo.anu.edu.au (Darren Reed)
Subject: IRC spying to increase

In some mail from Simon Lorentsen, sie said:
> 
> There are some internet relay chat daemons that allow this, but doing a
> simple ping to the channel shows them, like unreal and ultimate, or a simple
> whois if you know the opers will show them in the channel when they are +I
> that you are part of.
> 
> It dosent require much skills or programing as a large number of IRCd's will
> allow this as the norm.

And just as similarly you can tell the client software not to respond to
pings sent to a channel in cases such as this or in general or...

If someone wants to monitor a channel using ircd or tcpdump or a sniffer
from some specialist company and they do it right, you won't know about
it nor will you be able to detect it.

All that you will catch using the above techniques is amateurs who are
playing around without being fully aware of what they're doing and the
environment in which they're working.

Darren


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ