You might want to have a look at: Haaaang on snoopy, snoopy hang on. (SSL for fun and profit) by stealth Phrack 57 (http://www.phrack.com/phrack/57/p57-0x0d) And yes you can redirect traffic through DNS poisoning, it will work for all sort of to what i say (Impersonating Host) Attacks. Like take this for example: I have seen this practically that hotmail.com was redirected to a local webserver machine running fake hotmail page as default page, and action was directed towards a CGI that saved all the input and showed a page that hotmail is currently down. :) Regards -------- Muhammad Faisal Rauf Danka Head of GemSEC / Chief Technology Officer Gem Internet Services (Pvt) Ltd. web: www.gem.net.pk Key Id: 0x784B0202 Key Fingerprint: 6F8C EDCF 6C6E 06A5 48D7 6A20 C592 484B 784B 0202 _____________________________________________________________ --------------------------- [ATTITUDEX.COM] http://www.attitudex.com/ --------------------------- _____________________________________________________________ Promote your group and strengthen ties to your members with emailat_private by Everyone.net http://www.everyone.net/?btn=tag
This archive was generated by hypermail 2b30 : Thu Aug 29 2002 - 15:06:07 PDT