This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: 1 When Toads Attack! Mitnick vs. Shimomura Original slides prepared by K. Liszka, The University of Akron Original slides prepared by K. Liszka, The University of Akron for 3460:453/553, Spring 2010 for 3460:453/553, Spring 2010 No so clever.. • Mitnick didn’t invent this attack himself. • The techniques involved had been known for some time. • He introduced no new innovations. • The only thing he did was use them in the real world. • You can perform this same attack today. – And spend 5 years in jail, too, or more depending on who you go after. The Target • Tsutomu’s Computers in San Diego – Ariel: Contained research and technology information about computer security and cellular technology . – This information could be used to anonymously break into many other systems. Diskless workstation (X terminal) Server (another) Computer reverse engineered cellular telephone software SunOS 4 t a r g e t Trust Relationship A B A trusts B finger • Service that returns information about users on a particular system. • Username – information about that user. finger John finger 2 What was Mitnick looking for? • Patterns of remote logins between the three computers....
View Full Document
- Fall '09
- Computer Security, IP address, Transmission Control Protocol, SYN flood, log files, Mitnick, • Mitnick