[iwar] [fc:Hacker.browser.may.give.users.a.peek]

From: Fred Cohen (fc@all.net)
Date: 2002-02-05 20:51:56


Return-Path: <sentto-279987-4433-1012971020-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 05 Feb 2002 20:54:07 -0800 (PST)
Received: (qmail 7749 invoked by uid 510); 6 Feb 2002 04:50:45 -0000
Received: from n15.groups.yahoo.com (216.115.96.65) by all.net with SMTP; 6 Feb 2002 04:50:45 -0000
X-eGroups-Return: sentto-279987-4433-1012971020-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.190] by n15.groups.yahoo.com with NNFMP; 06 Feb 2002 04:49:40 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_1_3); 6 Feb 2002 04:50:20 -0000
Received: (qmail 97794 invoked from network); 6 Feb 2002 04:50:20 -0000
Received: from unknown (216.115.97.172) by m4.grp.snv.yahoo.com with QMQP; 6 Feb 2002 04:50:20 -0000
Received: from unknown (HELO red.all.net) (12.232.72.98) by mta2.grp.snv.yahoo.com with SMTP; 6 Feb 2002 04:50:20 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g164pus25297 for iwar@onelist.com; Tue, 5 Feb 2002 20:51:56 -0800
Message-Id: <200202060451.g164pus25297@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 5 Feb 2002 20:51:56 -0800 (PST)
Subject: [iwar] [fc:Hacker.browser.may.give.users.a.peek]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Hacker browser may give users a peek

By Shawna McAlearney, Infosecuritymag, 2/4/02
<a href="http://www.infosecuritymag.com/digest/2001/05-14-01.shtml#1a">http://www.infosecuritymag.com/digest/2001/05-14-01.shtml#1a>

Using peer-to-peer and encryption technology, the hacker group Cult of
the Dead Cow (CDC) says it's created a browser that will enable users to
circumvent government and corporate censorship.

The hacker group says it will unveil its Peekabooty browser at July's
DefCon conference in Las Vegas. Working much the same way as the
Gnutella file-swapping application, Peekabooty uses its users' computers
as a distributed network for collecting information. Once requested
information is found, the program encrypts the files so filters can't
recognize their content.

CDC, which also developed the remote Microsoft systems admin tool Back
Orifice, says it developed Peekabooty for users living under restrictive
government regulation who wanted to see information that would otherwise
be denied.

While Peekabooty could defeat many corporate security policies by
nullifying their gateway filters, the browser raises other security
concerns. Experts say it's possible to use a P2P application, such as
Napster and Gnutella, to break into additional areas inside a user's
system.

"My biggest concern, being a security person, is what are the security
mechanisms to stop people from downloading other files on your machine?"
says Brett Eldridge, vice president of security at OneSecure, a managed
security services provider. "What mechanisms are in place to prevent
people from downloading unauthorized data? This is a problem that's
common to all peer-to-peer systems."

Though it doesn't pose a new security threat per se, Peekabooty does
present significant liability issues for corporations whose employees
use it at work.

"It's possible (to access additional information inside a P2P users
system), but it's not a new threat," says Randy Marchany, a systems
administrator at Virginia Tech. "This is more of an information
disclosure issue than a new hacker tool. The danger it poses to a
company is a liability issue, depending on the content of the
information: competitor's sensitive files, Napster-style illegal music,
or even kiddie porn."

Liability and security issues aside, Peekabooty could make a mockery of
law enforcement's attempts to monitor electronic communications via
Carnivore (DCS 1000), Echelon or other surveillance programs. The FBI
didn't return calls for comment.

Once released, it will be nearly impossible to prevent corporate network
users from installing Peekabooty on their desktops. It's unknown how it
will be distributed or if the source code will be made public. Attempts
to reach CDC for further comment were unsuccessful.

"The job of corporate security people will be to analyze the protocol
and if they deem that it is a risk, as most probably will, figure out a
way to prevent it from going through the firewall," adds Eldridge.

Peekabooty isn't the first application designed to circumvent network
content controls. Other technology includes the Freedom Internet browser
and the SafeWeb Web sites.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Sponsored by VeriSign - The Value of Trust
Do you need to encrypt all your online transactions? Find
the perfect solution in this FREE Guide from VeriSign.
http://us.click.yahoo.com/jWSNbC/UdiDAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST