RE: Boot floppy

From: Marvin Simkin (Marvin.Simkin@asu.edu)
Date: Wed Apr 11 2007 - 13:10:18 EDT


Let's assume your intentions are honorable and authorized and legal and your subterfuge, whatever form it takes, is successful and you get your spyware to autorun on next boot or login.

If your target is as security conscious as you say, you have to consider the possibility that they are running a personal firewall. You won't know that, because your spyware hasn't reported back to you yet. And when it starts running, their firewall may alert them. Now the target goes from cautious to paranoid red alert.

Better to get hands on the hard disk and clone it as others are suggesting. Any attempt to inject code could backfire.

Marvin

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.

http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:43 EDT