Computer crimes (2)
Attacks
- Denial of service - some servers or services stop running
- IP Spoofing - a hacker poses as a legitimate host using a fabricated IP address
- Session hijacking - stealing sessions
- Web spoofing - creating fake Web sites
- DNS hijacking - redirect DNS
- Password Sniffing - there are some tools like TCP Grab or Passfinder
- Holes in commercial and public domain software (sendmail, flexlm, yppasswd, ftpd, various servers)