An unusual Instant Messenger question

David Kramer david at thekramers.net
Fri Jan 10 15:08:41 EST 2003


On Friday 10 January 2003 02:44 pm, Nathan Meyers wrote:

> My approach to this (which isn't pretty :-) would be to interpose a relay
> - such as a Jabber server - through which your progeny would connect,
> and hack that relay to take over the protocol stream to do a sign-off.
> This isn't a trivial problem - there's some reverse engineering to be
> pulled off, although all the necessary protocol knowledge is probably
> embedded somewhere in Jabber code.
>
> This is form of man-in-the-middle attack, and will look great on your
> hacking credentials.

... And would almost certainly be a DMCA violation, if you care about that 
sort of thing.

----------------------------------------------------------------------------
DDDD   David Kramer         david at thekramers.net       http://thekramers.net
DK KD  
DKK D  You don't usually hear "hydraulics" and "simplicity" 
DK KD  in the same sentence.
DDDD                                             Cathy Rogers, Junkyard Wars



More information about the Discuss mailing list