Network Security (6)
Attacks
- IP Spoofing - a hacker poses as a legitimate host using a fabricated IP address
- Web spoofing - creating fake Web sites
- Ping o'Death - ping with packets larger than 64K
- CGI PHF (Packet Handling Function) can be used to extract password file
- Social engineering method (obtaining username and password from another person)
- Holes in commercial and public domain software (sendmail, flexlm, yppasswd, ftpd, various servers)