Basic HTML version of Foils prepared May 19 99

Foil 38 Loki

From Computer Crimes: Examples of Network Security attacks Tango Group Internal Technology Seminars -- April 23 99. by Roman Markowski


Think of it as a telnet over ICMP (ping): gives the ability to tunnel shell sessions over ICMP or UDP port 53 (looks like DNS)
Offers a command line shell to the attacker on the victim machine
Works in a client-server model; first server must be installed on the victim's machine
http://www.phrack.com/Archives/phrack51.tgz
Defense: know what should be running on your system



© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Mon Aug 16 1999