Footprinting Security Engineering
Def: Gathering information about a potential system or Def: network network
Attackers point of view
Identify potential target systems. Identify which types of attacks may be useful o
WHAT IS IDENTITY THEFT?
Illegally using another persons
Identity Theft for Fun and Profit
name Social Security number drivers license number birth certificate credit card address telephone number password email bank account and routin
No so clever. When Toads Attack!
Mitnick vs. Shimomura
Mitnick didnt invent this attack himself. The techniques involved had been known for some time. He introduced no new innovations. The only thing he did was use them in the real world. You can perform
The TCP/IP protocol stack was developed in a trusting environment.
Protocols, Holes and Firewalls Oh My!
its a scary place out there.
Passwords for telnet, ftp, mail, etc. are sent over the network in the clear or with a known en
Original slides prepared by K. Liszka, The University of Akron for 3460:453/553, Spring 2010
There once was a rogue from St. I ves, Who had, at last count, seven wives, With a gasp and an utter, The snap of a shutter, Now al
Binary Numbering System
Uses the number 2 as its base Binary digits (bits): 0 and 1 Byte
Group of 8 bits Can represent 28 = 256 different values
Basic Networking Concepts and Network Hacking
UNIX and Linux Permissions
UNIX and Linux F
~ Zombies Ahead ~
Run for the Hills!
(or drive fast for a good splat when you hit them)
K. Liszka, The University of Akron 3460:453/553 Computer Security
1. The access panel on the sign is generally protected by a small lock, but often are left unprotecte