Basic HTML version of Foils prepared Dec. 6 98

Foil 19 Network Security (6)

From Introduction to Network Management Lectures at Xi'an Jaotong University -- Sept 1998. by Roman Markowski


1 Attacks
  • IP Spoofing - a hacker poses as a legitimate host using a fabricated IP address
  • Web spoofing - creating fake Web sites
  • Ping o'Death - ping with packets larger than 64K
  • CGI PHF (Packet Handling Function) can be used to extract password file
  • Social engineering method (obtaining username and password from another person)
  • Holes in commercial and public domain software (sendmail, flexlm, yppasswd, ftpd, various servers)

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun Dec 6 1998