Hijacking
Results 1 to 5 of 5

Thread: Hijacking

  1. #1
    Junior Member
    Join Date
    Aug 2006
    Posts
    7

    Hijacking

    This is a two part question if you guys don't mind. The first question is: Can I spoof an IP and mac address without Hijacking?

    The Second question is: How do I protect my users from hijacking?

  2. #2
    Leftie Linux Lover the_JinX's Avatar
    Join Date
    Nov 2001
    Location
    Beverwijk Netherlands
    Posts
    2,535
    The first answer is: the question is a bit like: Can I drive a car without bassball.. It doesn't make sence..

    The secon answer is a bit more complecated.. But also quite easy..
    Use propperly encrypted protocols for anything outside of your local network..
    That means: ssh https ftps imaps pop3s smtps and more nice acronyms..
    ASCII stupid question, get a stupid ANSI.
    When in Russia, pet a PETSCII.

    Get your ass over to SLAYRadio the best station for C64 Remixes !

  3. #3
    Junior Member
    Join Date
    Aug 2006
    Posts
    7
    But how do I protect hijacking from within my network?

  4. #4
    Leftie Linux Lover the_JinX's Avatar
    Join Date
    Nov 2001
    Location
    Beverwijk Netherlands
    Posts
    2,535
    Could you elaborate..

    You are not giving us much to work with here..

    What kind of network is it..
    What kinds of hijacking are you afraid of (what services)..
    etc..
    ASCII stupid question, get a stupid ANSI.
    When in Russia, pet a PETSCII.

    Get your ass over to SLAYRadio the best station for C64 Remixes !

  5. #5
    Junior Member
    Join Date
    Aug 2006
    Posts
    7
    Yeah, sorry. I am worried about http traffic. If RDP is susceptible to hijacking I am also worried about that. It is a 2003 domain with one t1 wan link and 2 t1 pipes to the internet. I am worried about layer 2 attacks from internal users.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •