Anatomy of a Hack - 8/23/2007 Anatomy of a Hack of Hack Wm....

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
8/23/2007 1 Anatomy of a Hack Wm. Arthur Conklin, PhD Assistant Professor Department of Information & Logistics Technology College of Technology Agenda Models Knowing the enemy Methodology of a Hack 2 2007 Wm. Arthur Conklin, PhD
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8/23/2007 2 Operational Security Model o Protection = o Prevention + o Detection + o Response 3 2007 Wm. Arthur Conklin, PhD DoD Test P R D R O T E C T I O N E T E C T I O N E A C T I O N 38,000 Attacks 24,700 Succeed 988 Detected 23,712 267 Reported 721 Not Reported 2007 Wm. Arthur Conklin, PhD 13,300 Blocked Undetected
Background image of page 2
8/23/2007 3 History The Art of War, Sun Tzu ¾ Know the enemy ¾ Know yourself…and in a 100 battles you will never be defeated ¾ If ignorant both of your enemy and of yourself you are certain in every battle to be in peril 5 2007 Wm. Arthur Conklin, PhD Anatomy of a Hack ¾ Footprinting ¾ Scanning ¾ Enumeration ¾ Gain Access ¾ Escalate Privilege ¾ Pilfer ¾ Create Backdoors ¾ Cover Tracks 6 ¾ DOS 2007 Wm. Arthur Conklin, PhD
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 8

Anatomy of a Hack - 8/23/2007 Anatomy of a Hack of Hack Wm....

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online