Re: RES: Instant Messenger

From: RSnake (rsnake@shocking.com)
Date: Sun Sep 05 2004 - 15:49:49 EDT


        On the flip side I wrote a short paper on bypassing content filters by
sending Trillian Pro messages over SSH. It's a tad off topic, but still
relevant: http://www.shocking.com/~rsnake/trillianremote.html

On Fri, 3 Sep 2004, Alexandre Cezar wrote:

| Date: Fri, 3 Sep 2004 11:42:31 -0300
| From: Alexandre Cezar <acezar@opencs.com.br>
| To: Ido Rosen <ido@cs.uchicago.edu>,
| "Murtland, Jerry" <MurtlandJ@Grangeinsurance.com>
| Cc: pen-test@securityfocus.com, webappsec@securityfocus.com,
| full-disclosure@lists.netsys.com
| Subject: RES: Instant Messenger
|
| Take a look at http://www.akonix.com for securing IM communication and
| I recommend this paper
| www.giac.org/practical/GSEC/Frank_Reiss_GSEC.pdf
|
|
| Regards
| -----Mensagem original-----
| De: Ido Rosen [mailto:ido@cs.uchicago.edu]
| Enviada em: quinta-feira, 2 de setembro de 2004 23:17
| Para: Murtland, Jerry
| Cc: pen-test@securityfocus.com; webappsec@securityfocus.com;
| full-disclosure@lists.netsys.com
| Assunto: Re: Instant Messenger
|
| Jabber.
|
| On Thu, 2 Sep 2004 10:00:18 -0400
| "Murtland, Jerry" <MurtlandJ@Grangeinsurance.com> wrote:
|
| > I am looking for white papers on enterprise Instant Messenger security
| > concerns. It doesn't have to be, but anything on MSN IM would be
| > helpful too. Does anyone have any good resources to share?
| >
| > Jerry J. Murtland
| >
| >
| >
|
|
| --
| +-------------------------------------------------+
| | Email : ido@ieee.org / ido@cs.uchicago.edu |
| | Jabber : phaedo@jabber.org |
| | PGP : http://www.dork.com/ido |
| +-------------------------------------------------+
|

-R

The information in this email is confidential and may be legally
privileged. It is intended solely for the addressee. Access to
this email by anyone else is unauthorized. If you are not the
intended recipient, any disclosure, copying, distribution or any
action taken or omitted to be taken in reliance on it is
expressly prohibited and may be unlawful.

------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:04 EDT