First page Back Continue Last page Summary Graphics
Who do I want to be today?
- Some exploits require user name identification
- Here are a few methods that an attacker can use to gain user name information:
- qtip (Windows NT)
- finger (Unix)
- network sniffing (will discuss this later)
- other systems on network (other UNIX systems, Microsoft Windows
)
- predictable names (for example, root)