{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Anatomy of a Hack - Anatomy of a Hack of Hack Wm Arthur...

Info icon This preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
8/23/2007 1 Anatomy of a Hack Wm. Arthur Conklin, PhD Assistant Professor Department of Information & Logistics Technology College of Technology Agenda Models Knowing the enemy Methodology of a Hack 2 2007 Wm. Arthur Conklin, PhD
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
8/23/2007 2 Operational Security Model o Protection = o Prevention + o Detection + o Response 3 2007 Wm. Arthur Conklin, PhD DoD Test P R D R O T E C T I O N E T E C T I O N E A C T I O N 38,000 Attacks 24,700 Succeed 988 Detected 23,712 U d d 267 Reported 721 Not Reported 2007 Wm. Arthur Conklin, PhD 13,300 Blocked Undetected
Image of page 2
8/23/2007 3 History The Art of War, Sun Tzu ¾ Know the enemy ¾ Know yourself…and in a 100 battles you will never be defeated ¾ If ignorant both of your enemy and of yourself you are certain in every battle to be in peril 5 2007 Wm. Arthur Conklin, PhD Anatomy of a Hack ¾ Footprinting ¾ Scanning ¾ Enumeration ¾ Gain Access ¾ Escalate Privilege ¾ Pilfer ¾ Create Backdoors ¾ Cover Tracks 6 ¾ DOS 2007 Wm. Arthur Conklin, PhD
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon