[711] in Intrusion Detection Systems
Re: Up Yours!
daemon@ATHENA.MIT.EDU (brian)
Mon Jul 8 18:51:57 1996
Date: Fri, 05 Jul 1996 17:15:51 -0500
From: brian <brianc@telepath.com>
To: ids@uow.edu.au
Reply-To: ids@uow.edu.au
mailbombing is not 100% anonymous.. if you know what your doing, it's
quite possible to track the mail back to where it's coming from. most
mail programs don't display the headers, and most people don't think to
look, but there is alot info to be gained from them.
[ Not true, who said the bomber will use a mail program - what if I
just telnet to the smtp port and send smtp commands directly (ofcourse
ident maybe running - but this can be overcome but often not really
necessary just look for another to act as an intermediary). - RuF ]
brianc@telepath.com
demented enterprises, ltd.