Basic HTML version of Foils prepared
May 19 99
Foil 7 Typical Scenario - data gathering
From
Computer Crimes: Examples of Network Security attacks Tango Group Internal Technology Seminars --
April 23 99
.
by
Roman Markowski
1
IP space, names, mail servers, contact information
whois, nslookup
2
management, topology and gateway data
(scotty) discover {-smtp | icmp}
ping, traceroute
3
information about hosts
strobe -b1 -e1024 $host
nslookup $host
satan (tcp_scan, udp_scan),saint, mscan, scotty, netcat, queso, nmap, dig, etc. etc
in Table To:
©
Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu
If you have any comments about this server, send e-mail to
webmaster@npac.syr.edu
.
Page produced by
wwwfoil
on Mon Aug 16 1999