Basic HTML version of Foils prepared May 19 99

Foil 5 Typical Scenario

From Computer Crimes: Examples of Network Security attacks Tango Group Internal Technology Seminars -- April 23 99. by Roman Markowski


gain access to an account
  • default or ease to guess passwords; social engineering
  • exploit a vulnerabilities in an operating systems - Unix services are particularly vulnerable (sendmail /IMAP/POP, NFS, NIS, DNS/BIND, FTP, TFTP, SYSLOG)
use "crack" to break more user passwords
obtain superuser privileges
install "back doors" (Trojan Horses)
install sniffers (packet and password grabbers) to obtain more password and site information



© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Mon Aug 16 1999