Basic HTML version of Foils prepared Dec. 6 98

Foil 18 Network Security (5)

From Introduction to Network Management Lectures at Xi'an Jaotong University -- Sept 1998. by Roman Markowski


1 Computer crimes
  • Attackers: hackers, crackers, vandals, spies
  • First network attack: 1988 (Worm)
2 Attacks
  • viruses
  • trojan horses and system modifications (modified login, su, telnet, in.telnetd, ftp, ls, ps, netstat, ifconfig, find, du, df, libc, sync, inetd, and syslogd)
  • DNS hijacking - redirect DNS
  • Password Sniffing - there are some tools like TCP Grab or Passfinder;
  • SYNC Flood - forging an IP address on a SYN packet which is basically a synchronization packet for TCP traffic

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun Dec 6 1998