Return-Path: <sentto-279987-4433-1012971020-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 05 Feb 2002 20:54:07 -0800 (PST) Received: (qmail 7749 invoked by uid 510); 6 Feb 2002 04:50:45 -0000 Received: from n15.groups.yahoo.com (216.115.96.65) by all.net with SMTP; 6 Feb 2002 04:50:45 -0000 X-eGroups-Return: sentto-279987-4433-1012971020-fc=all.net@returns.groups.yahoo.com Received: from [216.115.97.190] by n15.groups.yahoo.com with NNFMP; 06 Feb 2002 04:49:40 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_1_3); 6 Feb 2002 04:50:20 -0000 Received: (qmail 97794 invoked from network); 6 Feb 2002 04:50:20 -0000 Received: from unknown (216.115.97.172) by m4.grp.snv.yahoo.com with QMQP; 6 Feb 2002 04:50:20 -0000 Received: from unknown (HELO red.all.net) (12.232.72.98) by mta2.grp.snv.yahoo.com with SMTP; 6 Feb 2002 04:50:20 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g164pus25297 for iwar@onelist.com; Tue, 5 Feb 2002 20:51:56 -0800 Message-Id: <200202060451.g164pus25297@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 5 Feb 2002 20:51:56 -0800 (PST) Subject: [iwar] [fc:Hacker.browser.may.give.users.a.peek] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Hacker browser may give users a peek By Shawna McAlearney, Infosecuritymag, 2/4/02 <a href="http://www.infosecuritymag.com/digest/2001/05-14-01.shtml#1a">http://www.infosecuritymag.com/digest/2001/05-14-01.shtml#1a> Using peer-to-peer and encryption technology, the hacker group Cult of the Dead Cow (CDC) says it's created a browser that will enable users to circumvent government and corporate censorship. The hacker group says it will unveil its Peekabooty browser at July's DefCon conference in Las Vegas. Working much the same way as the Gnutella file-swapping application, Peekabooty uses its users' computers as a distributed network for collecting information. Once requested information is found, the program encrypts the files so filters can't recognize their content. CDC, which also developed the remote Microsoft systems admin tool Back Orifice, says it developed Peekabooty for users living under restrictive government regulation who wanted to see information that would otherwise be denied. While Peekabooty could defeat many corporate security policies by nullifying their gateway filters, the browser raises other security concerns. Experts say it's possible to use a P2P application, such as Napster and Gnutella, to break into additional areas inside a user's system. "My biggest concern, being a security person, is what are the security mechanisms to stop people from downloading other files on your machine?" says Brett Eldridge, vice president of security at OneSecure, a managed security services provider. "What mechanisms are in place to prevent people from downloading unauthorized data? This is a problem that's common to all peer-to-peer systems." Though it doesn't pose a new security threat per se, Peekabooty does present significant liability issues for corporations whose employees use it at work. "It's possible (to access additional information inside a P2P users system), but it's not a new threat," says Randy Marchany, a systems administrator at Virginia Tech. "This is more of an information disclosure issue than a new hacker tool. The danger it poses to a company is a liability issue, depending on the content of the information: competitor's sensitive files, Napster-style illegal music, or even kiddie porn." Liability and security issues aside, Peekabooty could make a mockery of law enforcement's attempts to monitor electronic communications via Carnivore (DCS 1000), Echelon or other surveillance programs. The FBI didn't return calls for comment. Once released, it will be nearly impossible to prevent corporate network users from installing Peekabooty on their desktops. It's unknown how it will be distributed or if the source code will be made public. Attempts to reach CDC for further comment were unsuccessful. "The job of corporate security people will be to analyze the protocol and if they deem that it is a risk, as most probably will, figure out a way to prevent it from going through the firewall," adds Eldridge. Peekabooty isn't the first application designed to circumvent network content controls. Other technology includes the Freedom Internet browser and the SafeWeb Web sites. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Sponsored by VeriSign - The Value of Trust Do you need to encrypt all your online transactions? Find the perfect solution in this FREE Guide from VeriSign. http://us.click.yahoo.com/jWSNbC/UdiDAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST