[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <43452B85.7050806@csuohio.edu>
Date: Thu Oct 6 14:50:11 2005
From: michael.holstein at csuohio.edu (Michael Holstein)
Subject: Interesting idea for a covert channel or I just
didn't research enough?
> attacker sends packets -> packets are dropped by firewall -> packets
> properties are captured in logs -> backdoor reads logs and finds
> encoded commands -> commands are executed
As a covert channel? .. no, it's a waste. Once you have the access to
set that up, you could establish any number of more efficient schemes.
As a way to do a "remote wake-up" though .. it might have some promise
.. but it still depends on too many other variables.
~Mike.
Powered by blists - more mailing lists