Security Basics mailing list archives
Re: analyzing client / server traffic
From: Jonathan Strine <strinej () netpanel com>
Date: Sun, 6 Apr 2003 12:35:45 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1You may also wish to try base64 encoding the plaintext data and looking for the converted string in the data stream. I know of several applications which use base64 to obfuscate the username/password.
- --- Jonathan Strine CCNA strinej () netpanel com PGP Key ID: 0x0A02201C -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (Darwin) iEYEARECAAYFAj6QV2UACgkQ/EuE+goCIBz81ACgp0ac/6AQPaSeCiea+krXZBmX UtwAoL4CH0asv5Gl28aW9ImGjg370x9g =QK// -----END PGP SIGNATURE----- ------------------------------------------------------------------- SurfControl E-mail Filter puts the brakes on spam, viruses and malicious code. Safeguard your business critical communications. Download a free 30-day trial: http://www.securityfocus.com/SurfControl-security-basics
Current thread:
- analyzing client / server traffic J J (Apr 04)
- Re: analyzing client / server traffic James Washer (Apr 04)
- Re: analyzing client / server traffic Jonathan Strine (Apr 07)
