Basic HTML version of Foils prepared July 6 99

Foil 74 Computer crimes (2)

From Security Infrastructure fo Electronic Commerce and Internet CPS714 Computational Science Information Track -- June 2 and June 7 99. by Roman Markowski


1 Attacks
  • Denial of service - some servers or services stop running
  • IP Spoofing - a hacker poses as a legitimate host using a fabricated IP address
  • Session hijacking - stealing sessions
  • Web spoofing - creating fake Web sites
  • DNS hijacking - redirect DNS
  • Password Sniffing - there are some tools like TCP Grab or Passfinder
  • Holes in commercial and public domain software (sendmail, flexlm, yppasswd, ftpd, various servers)

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Tue Jul 6 1999