Basic HTML version of Foils prepared May 19 99

Foil 38 Loki

From Computer Crimes: Examples of Network Security attacks Tango Group Internal Technology Seminars -- April 23 99. by Roman Markowski


1 Think of it as a telnet over ICMP (ping): gives the ability to tunnel shell sessions over ICMP or UDP port 53 (looks like DNS)
2 Offers a command line shell to the attacker on the victim machine
3 Works in a client-server model; first server must be installed on the victim's machine
4 http://www.phrack.com/Archives/phrack51.tgz
5 Defense: know what should be running on your system

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Mon Aug 16 1999