[711] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Re: Up Yours!

daemon@ATHENA.MIT.EDU (brian)
Mon Jul 8 18:51:57 1996

Date: Fri, 05 Jul 1996 17:15:51 -0500
From: brian <brianc@telepath.com>
To: ids@uow.edu.au
Reply-To: ids@uow.edu.au

mailbombing is not 100% anonymous..  if you know what your doing, it's
quite possible to track the mail back to where it's coming from.  most
mail programs don't display the headers, and most people don't think to
look, but there is alot info to be gained from them.

[ Not true, who said the bomber will use a mail program - what if I
just telnet to the smtp port and send smtp commands directly (ofcourse
ident maybe running - but this can be overcome but often not really 
necessary just look for another to act as an intermediary). - RuF ]

brianc@telepath.com
demented enterprises, ltd.

home help back first fref pref prev next nref lref last post