This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: 1 When Toads Attack! Mitnick vs. Shimomura Original slides prepared by K. Liszka, The University of Akron Original slides prepared by K. Liszka, The University of Akron for 3460:453/553, Spring 2010 for 3460:453/553, Spring 2010 No so clever.. Mitnick didnt invent this attack himself. The techniques involved had been known for some time. He introduced no new innovations. The only thing he did was use them in the real world. You can perform this same attack today. And spend 5 years in jail, too, or more depending on who you go after. The Target Tsutomus Computers in San Diego Ariel: Contained research and technology information about computer security and cellular technology . This information could be used to anonymously break into many other systems. Diskless workstation (X terminal) Server (another) Computer reverse engineered cellular telephone software SunOS 4 t a r g e t Trust Relationship A B A trusts B finger Service that returns information about users on a particular system. Username information about that user. finger John finger 2 What was Mitnick looking for? Patterns of remote logins between the three computers....
View Full Document
This note was uploaded on 02/21/2011 for the course CS 567 taught by Professor Dr.shambooupadhyay during the Fall '09 term at SUNY Buffalo.
- Fall '09
- Computer Security