[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200412010427.iB14R2Q21699@netsys.com>
From: xtrecate at spymac.com (xtrecate)
Subject: Network Sniffing
The article states that the FBI served subpoenas for specific information
from insecure.org, likely after finding evidence that some specific attacker
(who, no doubt, did something which deserves to be investigated) retrieved
data from insecure.org. It would appear they are simply trying to
cross-reference logs to discover an attacker's real IP address. This is
pretty legitimate, and Fyodor was apparently very diligent in ensuring all
information was retrieved via legal methods.
I don't see any reason to assume that the FBI is actively monitoring
insecure.org's HTTP logs. Even if they did have a strangle hold on the
logs, there is really nothing to fear as it is a legitimate tool with
legitimate purposes.
People intending to commit felonies over the internet, obviously, have
something to worry about... though I'm not sure why anyone would be
sympathetic to their plight.
--xtrecate
-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Danny
Sent: Tuesday, November 30, 2004 2:15 PM
To: Ben Nelson
Cc: Crehan, Joe (EM, ITS, Contractor); full-disclosure@...ts.netsys.com
Subject: Re: [Full-Disclosure] Network Sniffing
On Tue, 30 Nov 2004 13:08:12 -0700, Ben Nelson <lists@...om600.org> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Take a look at:
> http://www.insecure.org/tools.html
[...]
Note: The FBI is monitoring HTTP logs from insecure.org.
http://slashdot.org/article.pl?sid=04/11/25/1835238&from=rss
...D
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists