An unusual Instant Messenger question
David Kramer
david at thekramers.net
Fri Jan 10 15:08:41 EST 2003
On Friday 10 January 2003 02:44 pm, Nathan Meyers wrote:
> My approach to this (which isn't pretty :-) would be to interpose a relay
> - such as a Jabber server - through which your progeny would connect,
> and hack that relay to take over the protocol stream to do a sign-off.
> This isn't a trivial problem - there's some reverse engineering to be
> pulled off, although all the necessary protocol knowledge is probably
> embedded somewhere in Jabber code.
>
> This is form of man-in-the-middle attack, and will look great on your
> hacking credentials.
... And would almost certainly be a DMCA violation, if you care about that
sort of thing.
----------------------------------------------------------------------------
DDDD David Kramer david at thekramers.net http://thekramers.net
DK KD
DKK D You don't usually hear "hydraulics" and "simplicity"
DK KD in the same sentence.
DDDD Cathy Rogers, Junkyard Wars
More information about the Discuss
mailing list