Hello all. I have a couple of questions that on the surface don't seem to be related to this list, please bear with me. We have our firewall in place, and issued 'smartcard' to those individuals that require access to hosts inside the 'protected' zone. Here's the 'sticky wicket' , all individuals outside the 'perimeter' are running Win95, and we have no policy in place to control how their systems are setup. I'm trying to find out what methodology could be use to subvert/snoop these boxes and possibly 'highjack' their telnet sessions to devices inside the protected zone. Please respond offlist, and if people wish I will send compilation to the list. Jim Leo adminat_private
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 12:58:22 PDT