{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Mitnick - 1 When Toads Attack Mitnick vs Shimomura Original...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 1 When Toads Attack! Mitnick vs. Shimomura Original slides prepared by K. Liszka, The University of Akron Original slides prepared by K. Liszka, The University of Akron for 3460:453/553, Spring 2010 for 3460:453/553, Spring 2010 No so clever.. • Mitnick didn’t invent this attack himself. • The techniques involved had been known for some time. • He introduced no new innovations. • The only thing he did was use them in the real world. • You can perform this same attack today. – And spend 5 years in jail, too, or more depending on who you go after. The Target • Tsutomu’s Computers in San Diego – Ariel: Contained research and technology information about computer security and cellular technology . – This information could be used to anonymously break into many other systems. Diskless workstation (X terminal) Server (another) Computer reverse engineered cellular telephone software SunOS 4 t a r g e t Trust Relationship A B A trusts B finger • Service that returns information about users on a particular system. • Username – information about that user. finger John finger 2 What was Mitnick looking for? • Patterns of remote logins between the three computers....
View Full Document

{[ snackBarMessage ]}

Page1 / 4

Mitnick - 1 When Toads Attack Mitnick vs Shimomura Original...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon bookmark
Ask a homework question - tutors are online