[Asterisk-biz] voip VPN solution requirement
steve szmidt
steve at szmidt.org
Mon May 2 06:54:47 MST 2005
On Sunday 01 May 2005 21:13, Chris Mason (Lists) wrote:
> Is there really people out there reading the sip traffic? Short of being
> the ISP, how would you get that done?
>
> Chris Mason
> www.anguillaguide.com
There is people who have NOTHING better to do than hack others. There are
people who make GREAT living doing it by selling what they got (stole).
Don't be naive to think that just because you have no interest and don't know
how, that there are not hords of people who do. When something is travelling
in cleartext (not encrypted) there will always be people who can collect and
read it. Or listen.
To get an idea, run tcpdump -vvn on your external NIC. Know your own IP
(ifconfig) and see what is and isn't for you.
You can specify ports you want to listen to and not with:
tcpdump -nvv port 110 and port 25 and not arp
for example. This will listen to email coming and going but not arp traffic.
Of course you can have even more fun by firing up ethereal and read the
content of the traffic. That's all just traffic that happens to flow by you.
The next thing to do is to hack some place where more interesting things flow
by. It's not hard at all, just tedious.
If you sit in an office LAN (where most illegal hacking originate from) you
can get everyones passwords etc.
These are standard tools used to debug networks with. Hackers tend to do
things which are not what normal people do. I.e. they make software do things
nobody expected it would do, by putting it in unexpected situations. Like
feeding 1000 characters into a small field built for 10. They essentually
"break" it and take advantage of the "irrational" behavior.
There's lots you can read on how to do these things online, and in bookstores.
There is software that does the hacking automatically for you and is used by
what is known as script kiddies. They are not good enough to write the
software but they know how to run them. So they run a bunch of
scripts/programs in hope that it will create some effect.
There's a very funny transcript of such a kid threatening to format someones
computer at: http://www.jellyslab.com/~bteo/hacker.htm
Oops, he appears to be off-line. Essentially he gave the loop back address to
a wanna be hacker, who dared him to give it to his so he could hack him.
The loop back address is your own computer, it's used for testing and whatnot.
So the kid then attacks himself thinking he's attacking the other guy.
Failing to crash the other guys computer as his own is "crashing" in the
attempt, he then tries to format the other guys computer, thus wiping out his
own computer.
--
Steve Szmidt
"They that would give up essential liberty for temporary safety
deserve neither liberty nor safety."
Benjamin Franklin
More information about the asterisk-biz
mailing list