Basic HTML version of Foils prepared Dec. 6 98

Foil 22 Network Security (8)

From Introduction to Network Management Lectures at Xi'an Jaotong University -- Sept 1998. by Roman Markowski


1 Typical scenario:
  • The intruders first penetrate a system and gain root access through an unpatched vulnerability.
  • The intruders then run a network monitoring tool that captures up to the first 128 keystrokes of all newly opened FTP, telnet, and rlogin sessions visible within the compromised system's domain. These keystrokes usually contain host, account, and password information for user accounts on other systems; the intruders log these for later retrieval. The intruders typically install Trojan Horse programs to support subsequent access to the compromised system and to hide their network monitoring process.

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun Dec 6 1998