home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: alt.hackers
- Path: sparky!uunet!usc!zaphod.mps.ohio-state.edu!menudo.uh.edu!sugar!taronga!peter
- From: peter@taronga.com (Peter da Silva)
- Subject: Re: Debugging program on mailing machine
- Message-ID: <6ARHWB9@taronga.com>
- Organization: Taronga Park BBS
- References: <1992Jul25.012355.11106@ctr.columbia.edu> <6NQHY31@taronga.com> <1992Jul27.043409.13221@ctr.columbia.edu>
- Date: Mon, 27 Jul 1992 11:04:35 GMT
- Approved: we don't need no stinking obhack.
- Lines: 23
-
- In article <1992Jul27.043409.13221@ctr.columbia.edu> kibirev@csa.bu.edu (oleg kibirev) writes:
- >Bthw, how does one read /var/spool/mqueue without becoming root first?
-
- Top ten methods for snooping mail:
- 1. You remove the drive containing /var and install it in your own machine.
- 2. You put a tap on the line coming into the machine.
- 3. You break root.
- 4. You start out being root on another machine along the path the mail takes.
- 5. You snoop IP traffic.
- 6. You don't, you read /usr/spool/uucp.
- 7. You plant a trojan horse in sendmail/smtpd/uucico/rmail/...
- 8. You bribe the system operator with a brand new pocket protector.
- 9. You find a system that stages mail in /tmp.
- 10. You walk in with a boot floppy and take over.
-
- Lets face it, mail isn't secure.
-
- You wanted a hack... there's 10.
- --
- `-_-'
- Have you hugged your wolf today? 'U`
-
- Peter da Silva, Taronga Park BBS, Houston, TX +1 713 568 0480/1032
-