1 |
Attacks
-
IP Spoofing - a hacker poses as a legitimate host using a fabricated IP address
-
Web spoofing - creating fake Web sites
-
Ping o'Death - ping with packets larger than 64K
-
CGI PHF (Packet Handling Function) can be used to extract password file
-
Social engineering method (obtaining username and password from another person)
-
Holes in commercial and public domain software (sendmail, flexlm, yppasswd, ftpd, various servers)
|