Find this at http://www.npac.syr.edu/users/gcf/computercrimesspring99/

Computer Crimes: Examples of Network Security attacks

Given by Roman Markowski at Tango Group Internal Technology Seminars on April 23 99. Foils prepared May 19 99

Examples and Typical attack weopens
Denial of Service, DNS Cache Poisoning, Port Scanners, Back Orifice
Web and Java
UNIX is better than NT


Table of Contents for Computer Crimes: Examples of Network Security attacks


001 Computer Crimes Examples of Network Security Attacks
002 Computer crimes (1)
003 Computer crimes (2)
004 Computer crimes (3)
005 Typical Scenario
006 Typical Scenario - collecting tools
007 Typical Scenario - data gathering
008 Typical Scenario - research
009 Threats
010 Trends
011 Denial of Service Attacks (1)
012 Denial of Service Attacks (2)
013 Denial of Service Attacks (3)
014 Denial of Service Attacks (4)
015 Denial of Service Attacks (5)
016 Denial of Service Attacks (6)
017 Denial of Service Attacks (7)
018 DNS Cache Poisoning (1)
019 DNS Cache Poisoning (2)
020 DNS Cache Poisoning (3)
021 Port Scanners (1)
022 Port Scanners (2)
023 Port Scanners (3)
024 Port Scanners (4)
025 Port Scanners (5)
026 Back Orifice (1)
027 Back Orifice (2)
028 Back Orifice (3)
029 Back Orifice (4)
030 Back Orifice (5)
031 Session Hijacking (1)
032 Session Hijacking (2)
033 A Social Engineering Attack
034 Web Spoofing
035 Frame Spoofing
036 Web Exposures
037 Sneakin
038 Loki
039 Crack / L0phtCrack
040 Java-based attacks
041 Cookies
042 Unix vs. Windows NT
043 Can I try Intrusion Tools ?


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Mon Aug 16 1999