Basic HTML version of Foils prepared
May 19 99
Foil 5 Typical Scenario
From
Computer Crimes: Examples of Network Security attacks Tango Group Internal Technology Seminars --
April 23 99
.
by
Roman Markowski
1
gain access to an account
default or ease to guess passwords; social engineering
exploit a vulnerabilities in an operating systems - Unix services are particularly vulnerable (sendmail /IMAP/POP, NFS, NIS, DNS/BIND, FTP, TFTP, SYSLOG)
2
use "crack" to break more user passwords
3
obtain superuser privileges
4
install "back doors" (Trojan Horses)
5
install sniffers (packet and password grabbers) to obtain more password and site information
in Table To:
©
Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu
If you have any comments about this server, send e-mail to
webmaster@npac.syr.edu
.
Page produced by
wwwfoil
on Mon Aug 16 1999