Home page logo

fulldisclosure logo Full Disclosure mailing list archives

How T-Mobil's network was compromised
From: gf gf <unknownsoldier93 () yahoo com>
Date: Thu, 17 Feb 2005 09:34:34 -0800 (PST)

Anyone know how the dude who hacked into T-Mobil's
network ( http://securityfocus.com/news/10516 )
actually did so?  Now that's it gone to court, the
data should be in the public record (anyone have any
lawyer friends who can get a transcript?)

In general, I think it would be invaluable to the
community to know how some of these extremely high
cost hacks were done.  I'm not talking about the
standard off-the-shelf exploits, I'm not even talking
about a simple write-your-own-zero-day-and-your-in -
I'm talking about very deep penetration into systems
presumably secured at multiple levels - things like
classifed systems and bank systems.  Real world,
start-to-finish case studies would be invaluable to
the community.  And they should be available publicly,
once they go to court.  Anyone?

PS Doesn't the secret service use a classification
system, like the mil, that would prevent sending
highyl sensitive emails in the clear?  From what I've
read, the guy compromised highly sensitive reports and
documentation.  Does any mobile carrier support PGP or
some other end-to-end encryption on their devices? 

Do you Yahoo!? 
All your favorites on one personal page – Try My Yahoo!
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]