2 |
Attacks
-
viruses
-
trojan horses and system modifications (modified login, su, telnet, in.telnetd, ftp, ls, ps, netstat, ifconfig, find, du, df, libc, sync, inetd, and syslogd)
-
DNS hijacking - redirect DNS
-
Password Sniffing - there are some tools like TCP Grab or Passfinder;
-
SYNC Flood - forging an IP address on a SYN packet which is basically a synchronization packet for TCP traffic
|