Table of contentsAnatomy of Internet Attacks
Democratization of Hacking
Slide 3
Where do I want to go?
Slide 5
Who do I want to be today?
Who do I want to be today? UNIX - finger
Slide 8
Who do I want to be today? NT - qtip
Slide 10
Who do I want to be today? Protection
Slide 12
Where is the door? Probing tools
Where is the door? Open Ports - Continued
Where is the door? nmap
Slide 16
Where is the door? Protection
Opening the door
CGI-Bin Exploit
Slide 20
Slide 21
Slide 22
CGI-Bin Exploit Protection
Slide 24
Opening the door John The Ripper
Slide 26
Opening the door l0phtcrack
Slide 28
Opening the door Protection
Who is watching?
Who is watching? Protection
Taking control
Becoming Superuser by Exploiting Buffer Overflow
Becoming Super-User by Exploiting Buffer Overflow
Slide 35
Backdoors and Trojan Horses
Slide 37
Slide 38
Backdoor - Back Orifice From Cult of the Dead Cow
Backdoor - Back Orifice 2000
Slide 41
Taking control Protection
Now, where can I go?
Now, where can I go? Packet Sniffers
Now, where can I go? Packet Sniffers - Sniffit
Slide 46
Now, where can I go? Packet Sniffers - Protection
Slide 48
Now, where can I go? VPN defeats Packet Sniffers
Slide 50
What else can we do
?
Slide 52
Slide 53
Slide 54
What else can we do
? Web Site Vandalism - Protection
What else can we do
? Denial-of-Service (DoS)
Denial-of-Service Example: LAND Attack
Slide 58
Distributed Denial of Service
Distributed Denial-Of-Service The Internet Meltdown
Distributed Denial of Service The Internet Meltdown
Distributed Attack Protective Measures
Distributed Attack Protection: Filtering & Router Configuration
What else can we do
? Hostile ActiveX and Java Applets
Slide 65
What else can we do
? Viruses
Virus and Hostile Applet Protection
Conclusions
|