1994-12-24 - Re: reading someone’s files

Header Data

From: Jonathan Cooper <entropy@IntNet.net>
To: “Perry E. Metzger” <perry@imsi.com>
Message Hash: c3fe7a7f8a48fbdabaa200b801981978359a3fa0f7ffb772840de002db42a6b4
Message ID: <Pine.SV4.3.91.941224100415.22880E-100000@xcalibur>
Reply To: <9412232026.AA22580@webster.imsi.com>
UTC Datetime: 1994-12-24 15:15:17 UTC
Raw Date: Sat, 24 Dec 94 07:15:17 PST

Raw message

From: Jonathan Cooper <entropy@IntNet.net>
Date: Sat, 24 Dec 94 07:15:17 PST
To: "Perry E. Metzger" <perry@imsi.com>
Subject: Re: reading someone's files
In-Reply-To: <9412232026.AA22580@webster.imsi.com>
Message-ID: <Pine.SV4.3.91.941224100415.22880E-100000@xcalibur>
MIME-Version: 1.0
Content-Type: text/plain


> I'm suprised that no one has given the obvious answers on this
> topic. If you have physical access to someone's machine, it is trivial
> to find out what their encryption keys are. After all, the victim
> types into the machine regularly -- recording all their keystrokes is
> not a difficult matter at all.

   Indeed.  Archie for DEPL.ZIP or DEPLSRC.ZIP - the program is called 
Delam's Elite Password Leecher (sic) and will do exactly this task.  Also 
you could write a 5 minute TSR in the language of your choice to hook 
interrupt 9 and write to a logfile; examples of this are all over the 
net.  If you must, post to alt.2600 asking for one, and 18,000 k0de 
k1ddies will mail you back uu'd copies.

-jon
( --------[ Jonathan D. Cooper ]--------[ entropy@intnet.net ]-------- )
( PGP 2.6.2 keyprint: 31 50 8F 82 B9 79 ED C4  5B 12 A0 35 E0 9B C0 01 )
( home page: http://hyperreal.com/~entropy/ ]-------[ Key-ID: 4082CCB5 )





Thread