Basic HTML version of Foils prepared
May 19 99
Foil 2 Computer crimes (1)
From
Computer Crimes: Examples of Network Security attacks Tango Group Internal Technology Seminars --
April 23 99
.
by
Roman Markowski
1
Computer crimes
First network attack: 1988 (Worm; Robert Morris, Cornell)
Attackers: hackers vs. crackers (vandals, spies)
hacker are proud of what they are doing and publish their achievements; crackers - hacking for profit
US companies lose $7.5 billion annually
2
Attacks
Social engineering method (obtaining username and password from another person)
Trojan Horses and system modifications (modified login, su, telnet, in.telnetd, ftp, ls, ps, netstat, ifconfig, find, du, df, libc, sync, inetd, and syslogd)
in Table To:
©
Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu
If you have any comments about this server, send e-mail to
webmaster@npac.syr.edu
.
Page produced by
wwwfoil
on Mon Aug 16 1999