Network Security (8)
Computer crimes
- Attackers: hackers, crackers, vandals, spies
- hacker are proud of what they are doing and publish their achievements; hacking for profit
- First network attack: 1988 (Worm)
Attacks
- Trojan Horses and system modifications (modified login, su, telnet, in.telnetd, ftp, ls, ps, netstat, ifconfig, find, du, df, libc, sync, inetd, and syslogd)
- Password Sniffing - there are some tools like TCP Grab or Passfinder;
- SYNC Flood - forging an IP address on a SYN packet which is basically a synchronization packet for TCP traffic