Mitnick - 1 When Toads Attack! Mitnick vs. Shimomura...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 1 When Toads Attack! Mitnick vs. Shimomura Original slides prepared by K. Liszka, The University of Akron Original slides prepared by K. Liszka, The University of Akron for 3460:453/553, Spring 2010 for 3460:453/553, Spring 2010 No so clever.. Mitnick didnt invent this attack himself. The techniques involved had been known for some time. He introduced no new innovations. The only thing he did was use them in the real world. You can perform this same attack today. And spend 5 years in jail, too, or more depending on who you go after. The Target Tsutomus Computers in San Diego Ariel: Contained research and technology information about computer security and cellular technology . This information could be used to anonymously break into many other systems. Diskless workstation (X terminal) Server (another) Computer reverse engineered cellular telephone software SunOS 4 t a r g e t Trust Relationship A B A trusts B finger Service that returns information about users on a particular system. Username information about that user. finger John finger 2 What was Mitnick looking for? Patterns of remote logins between the three computers....
View Full Document

This note was uploaded on 02/21/2011 for the course CS 567 taught by Professor Dr.shambooupadhyay during the Fall '09 term at SUNY Buffalo.

Page1 / 4

Mitnick - 1 When Toads Attack! Mitnick vs. Shimomura...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online