Basic HTML version of Foils prepared May 19 99

Foil 3 Computer crimes (2)

From Computer Crimes: Examples of Network Security attacks Tango Group Internal Technology Seminars -- April 23 99. by Roman Markowski


1 Attacks
  • Denial of service - some servers or services stop running
    • SYNC Flood, Ping o'Death
  • IP Spoofing - a hacker poses as a legitimate host using a fabricated IP address
  • Session hijacking - stealing sessions
  • Web spoofing - creating fake Web sites
  • DNS hijacking - redirect DNS
  • Password Sniffing - there are some tools like TCP Grab or Passfinder;
  • CGI PHF (Packet Handling Function) can be used to extract password file (Crack)
  • Holes in commercial and public domain software (sendmail, flexlm, yppasswd, ftpd, various servers)

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Mon Aug 16 1999