Catapults and grappling hooks: The tools and techniques of information warfare

被引:12
作者
Boulanger, A [1 ]
机构
[1] IBM Corp, Div Res, Thomas J Watson Res Ctr, Yorktown Heights, NY 10598 USA
关键词
D O I
10.1147/sj.371.0106
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For years, "hackers" have broken into computer systems, and now an entire industry is dedicated to computer network security. Both hackers and computer security professionals have developed software tools for either breaking into systems or identifying potential security problems within computer networks. This software can be found on compromised systems as well as within the toolkits of legitimate "tiger" teams that operate with the consent of the network owners. This paper describes some of the current techniques and tools employed by the hacker underground in breaching the security of networked computers, focusing primarily on UNIX(R)-based hosts connected to TCP/IP networks.
引用
收藏
页码:106 / 114
页数:9
相关论文
共 21 条
[1]  
[Anonymous], WOMENS ACCESS
[2]  
ASSANGE J, 1995, STROBE 1 2 PROGRAM D
[3]  
Bellovin S. M., 1989, Computer Communication Review, V19, P32, DOI 10.1145/378444.378449
[4]  
*CERT, 1996, CERT COORD CTR 1996
[5]  
*CERT, CERT FREQ ASK QUEST
[6]  
*CERT COORD CTR, 1997, CERT COORD CTR 1995
[7]  
CHRISTENSEN MJ, 1995, COURTNEY PROGRAM DOC
[8]  
*COMP SEC I, 1997, COMP CRIM SEC SURV
[9]  
FARMER D, 1995, SATAN SECURITY ANAL
[10]  
FARMER D, 1993, IMPROVING SECURITY Y