Basic HTML version of Foils prepared Dec. 6 98

Foil 21 Network Security (7)

From Introduction to Network Management Lectures at Xi'an Jaotong University -- Sept 1998. by Roman Markowski


Typical scenario:
  • gain access to an account
  • exploit a vulnerabilities in an operating systems (Unix services are particularly vulnerable (sendmail, NFS, NIS, DNS, FTP, TFTP, SYSLOG)
  • use "crack" to break more user passwords
  • obtain superuser privileges
  • install "back doors" (Trojan Horses)
  • install sniffers (packet and password grabbers) to obtain more password and site information



© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun Dec 6 1998