Computer crimes (2)
Attacks
- Denial of service - some servers or services stop running
- IP Spoofing - a hacker poses as a legitimate host using a fabricated IP address
- Session hijacking - stealing sessions
- Web spoofing - creating fake Web sites
- DNS hijacking - redirect DNS
- Password Sniffing - there are some tools like TCP Grab or Passfinder;
- CGI PHF (Packet Handling Function) can be used to extract password file (Crack)
- Holes in commercial and public domain software (sendmail, flexlm, yppasswd, ftpd, various servers)