Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: IRC protocols and insecurity
From: Jose Maria Lopez <jkerouac () bgsec com>
Date: 09 Sep 2004 18:41:13 +0200

El lun, 06 de 09 de 2004 a las 15:00, proc ps escribió:
Hello,

I've been looking for any white papers that describe the 
security/technical aspects of the IRC protocol, but so far just found 
mIRC exploits and insecurities.


Nessus check for some vulnerabilities in the ircd daemon, but I don't
know if that suits you in any way.

I'm trying to secure a building network based on an OpenBSD 3.5 server 
and Win32 clients.

As the clients purpose are just for file sharing, email, internet 
access, instant messaging and some irc usage for the students.


It's quite difficult to secure this kind of network at the server,
I better would be looking at the Win32 clients.

How can I secure/scan for virii what the members are downloading via 
IRC? How about the possibilities of hijacking connections via IRC? What 
are the threats that can come to this network via the IRC protocol?


The best you can do it's having an antivirus in each Win32 machine, in
daemon mode (always loaded), so it can detect any of the virii or worms
that users can download via IRC/DCC, email, or file sharing. It's the
easiest way to do it, but you can also try to use a corporate antivirus
in the server in daemon mode scanning for all the downloads.

Thanks and best regards.
-- 
Jose Maria Lopez Hernandez
Director Tecnico de bgSEC
jkerouac () bgsec com
bgSEC Seguridad y Consultoria de Sistemas Informaticos
http://www.bgsec.com
ESPAÑA

The only people for me are the mad ones -- the ones who are mad to live,
mad to talk, mad to be saved, desirous of everything at the same time,
the ones who never yawn or say a commonplace thing, but burn, burn, burn
like fabulous yellow Roman candles.
                -- Jack Kerouac, "On the Road"


------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]