On Fri, 4 Dec 2009 14:13:11 -0800
Tyler MacDonald wrote:
> Tudod Ki wrote:
...
> > - Can anyone sniff the traffic of computer "B"? e.g.: B computer is at a
> > - server farm [others in the farm can see the traffic?] - I think yes, but
> > - I'm not sure :O
>
> Yes, that's possible. However,
On Fri, 4 Dec 2009 14:13:11 -0800
Tyler MacDonald wrote:
...
> I believe when you use SOCKS, your browser stops doing DNS resolution and
> just hands the hostnames directly to the SOCKS server. So all they would be
> able to sniff is your encrypted SSH session, which they (hopefully) can't
> d
Tudod Ki wrote:
> but what's with cam attack?
>
> http://en.wikipedia.org/wiki/CAM_Table#Attacks
>
> they could attack a switch, and it will act as a hub? and then they can
> set promiscuous mode on their cards and sniff
Hmm. I didn't know about that one! I suppose it's possible. Of course, i
but what's with cam attack?
http://en.wikipedia.org/wiki/CAM_Table#Attacks
they could attack a switch, and it will act as a hub? and then they can set
promiscuous mode on their cards and sniff
--- On Fri, 12/4/09, Tyler MacDonald wrote:
From: Tyler MacDonald
Subject: Re: two questions
Tudod Ki wrote:
> if I:
>
> ssh -fND localhost:6000 someb...@192.168.56.5 -p PORTNUMBER
>
> from computer "A" to computer "B" [B = 192.168.56.5] then I can set the SOCKS
> proxy for e.g.: Firefox to use "localhost:6000" on computer "A". Ok. I can
> surf the web through "B".
>
> But:
> - Can
5 matches
Mail list logo