The Attack Process

download The Attack Process

of 55

Transcript of The Attack Process

  • 8/12/2019 The Attack Process

    1/55

    http://www.cert.org/research/JHThesis/Start.html
  • 8/12/2019 The Attack Process

    2/55

  • 8/12/2019 The Attack Process

    3/55

    http://my.safaribooksonline.com/158705115X/app01gloss01#app01gloss01entry66
  • 8/12/2019 The Attack Process

    4/55

    http://www.jargon.org/
  • 8/12/2019 The Attack Process

    5/55

    http://www.cert.org/research/JHThesis/Start.htmlhttp://my.safaribooksonline.com/158705115X/ch03lev1sec1#ch03fig02
  • 8/12/2019 The Attack Process

    6/55

    http://www.cert.org/research/JHThesis/Start.htmlhttp://my.safaribooksonline.com/158705115X/ch03lev1sec1#ch03fig02
  • 8/12/2019 The Attack Process

    7/55

    http://my.safaribooksonline.com/http://support.safaribooksonline.com/viewCat?cat=Account_Management&prod=safarihttp://support.safaribooksonline.com/faqs?prod=safarihttp://support.safaribooksonline.com/top?prod=safarihttp://support.safaribooksonline.com/alerts?prod=safarihttp://support.safaribooksonline.com/home?prod=safarihttp://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1http://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ROUGHCUTShttp://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/SHORTCUTShttp://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/BOOKTITLEhttp://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1#X2ludGVybmFsX0h0bWxWaWV3P3htbGlkPTE1ODcwNTExNXglMkZjaDAzbGV2MXNlYzUmcXVlcnk9http://appworld.blackberry.com/webstore/content/132080/https://play.google.com/store/apps/details?id=com.safaribooksonlinehttp://itunes.apple.com/us/app/safari-to-go/id385824712?mt=8http://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1#lefttabtoc
  • 8/12/2019 The Attack Process

    8/55

    http://my.safaribooksonline.com/book/networking/security/158705115xhttp://my.safaribooksonline.com/158705115x/pref07http://my.safaribooksonline.com/158705115x/pref06http://my.safaribooksonline.com/158705115x/pref05http://my.safaribooksonline.com/158705115x/pref04http://my.safaribooksonline.com/158705115x/pref03http://my.safaribooksonline.com/158705115x/pref02http://my.safaribooksonline.com/158705115x/pref01http://my.safaribooksonline.com/158705115x/copyrightp1ghttp://my.safaribooksonline.com/book/networking/security/158705115x/index/indexhttp://my.safaribooksonline.com/book/networking/security/158705115xhttp://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1?bookview=contentshttp://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1?bookview=searchhttp://my.safaribooksonline.com/book/networking/security/158705115xhttp://my.safaribooksonline.com/book/networking/security/158705115xhttps://ssl.safaribooksonline.com/trial?portal=my&iid=headerBanner-reader-linkhttp://my.safaribooksonline.com/subscribehttp://my.safaribooksonline.com/login?iid=reactivate-link&targetpage=/reactivationhttp://my.safaribooksonline.com/login?targetpage=/158705115x/ch03lev1sec1http://support.safaribooksonline.com/viewCat?cat=FAQ_Offline_Reading&prod=safarihttp://support.safaribooksonline.com/viewCat?cat=Mobile&prod=safarihttp://support.safaribooksonline.com/viewCat?cat=Content_Reader&prod=safarihttp://support.safaribooksonline.com/viewCat?cat=Content&prod=safarihttp://support.safaribooksonline.com/viewCat?cat=Billing&prod=safari
  • 8/12/2019 The Attack Process

    9/55

    http://my.safaribooksonline.com/158705115x/ch03lev1sec5http://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1http://my.safaribooksonline.com/158705115x/ch03lev1sec5http://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1http://my.safaribooksonline.com/158705115X/ch03lev1sec6http://my.safaribooksonline.com/158705115X/ch03lev1sec4http://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1http://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1http://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1http://my.safaribooksonline.com/158705115x/ch03lev1sec5?readerfullscreen=&readerleftmenu=1&reader=http://my.safaribooksonline.com/158705115x/indexhttp://my.safaribooksonline.com/158705115x/part04http://my.safaribooksonline.com/158705115x/part03http://my.safaribooksonline.com/158705115x/part02http://my.safaribooksonline.com/158705115x/ch04http://my.safaribooksonline.com/158705115x/ch03lev1sec8http://my.safaribooksonline.com/158705115x/ch03lev1sec7http://my.safaribooksonline.com/158705115x/ch03lev1sec6http://my.safaribooksonline.com/158705115x/ch03lev1sec5http://my.safaribooksonline.com/158705115x/ch03lev1sec4http://my.safaribooksonline.com/158705115x/ch03lev1sec3http://my.safaribooksonline.com/158705115x/ch03lev1sec2http://my.safaribooksonline.com/158705115x/ch03lev1sec1http://my.safaribooksonline.com/158705115x/ch03http://my.safaribooksonline.com/158705115x/ch02http://my.safaribooksonline.com/158705115x/ch01http://my.safaribooksonline.com/158705115x/part01
  • 8/12/2019 The Attack Process

    10/55

    http://my.safaribooksonline.com/158705115X/ch03lev1sec6http://my.safaribooksonline.com/158705115X/ch03lev1sec4
  • 8/12/2019 The Attack Process

    11/55

  • 8/12/2019 The Attack Process

    12/55

  • 8/12/2019 The Attack Process

    13/55

    http://www.nessus.org/http://www.insecure.org/nmap
  • 8/12/2019 The Attack Process

    14/55

    http://my.safaribooksonline.com/158705115X/part03#part03http://my.safaribooksonline.com/158705115X/ch04#ch04http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch04#ch04http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch04#ch04
  • 8/12/2019 The Attack Process

    15/55

    http://www.google.com/
  • 8/12/2019 The Attack Process

    16/55

    http://www.nessus.org/http://www.insecure.org/nmap
  • 8/12/2019 The Attack Process

    17/55

    http://expandcodesegments%28%29/
  • 8/12/2019 The Attack Process

    18/55

    http://www.insecure.org/nmap/nmap-fingerprinting-article.htmlhttp://expandcodesegments%28%29/
  • 8/12/2019 The Attack Process

    19/55

    http://winfingerprint.sourceforge.net/aptools.phphttp://www.netstumbler.com/
  • 8/12/2019 The Attack Process

    20/55

    http://www.ethereal.com/http://www.wardriving.com/
  • 8/12/2019 The Attack Process

    21/55

    http://my.safaribooksonline.com/getfile?item=cjVnNWkxMGhwL2ExcmRlY3g1YS9wMWlnczdtLzh0Zi9fY3MwLmx0MGk1YWdpZ2Yz
  • 8/12/2019 The Attack Process

    22/55

  • 8/12/2019 The Attack Process

    23/55

    http://my.safaribooksonline.com/158705115X/ch06#ch06http://www.doxpara.com/read.php/code/paketto.htmlhttp://www.insecure.org/stf/secnet_ids/secnet_ids.htmlhttp://monkey.org/~dugsong/fragroute/
  • 8/12/2019 The Attack Process

    24/55

    http://www.shmoo.com/phrack/Phrack49/p49-14http://www.cert.org/
  • 8/12/2019 The Attack Process

    25/55

    http://www.cgisecurity.com/articles/xss-faq.shtml
  • 8/12/2019 The Attack Process

    26/55

    http://my.safaribooksonline.com/158705115X/ch09#ch09http://www.w3.org/Security/Faq/wwwsf4.html
  • 8/12/2019 The Attack Process

    27/55

  • 8/12/2019 The Attack Process

    28/55

    http://www.hping.org/http://www.packetfactory.net/libnet/
  • 8/12/2019 The Attack Process

    29/55

  • 8/12/2019 The Attack Process

    30/55

  • 8/12/2019 The Attack Process

    31/55

  • 8/12/2019 The Attack Process

    32/55

  • 8/12/2019 The Attack Process

    33/55

  • 8/12/2019 The Attack Process

    34/55

    http://www.openwall.com/john/http://www.atstake.com/
  • 8/12/2019 The Attack Process

    35/55

    http://www.zetetic.net/products.htmlhttp://my.safaribooksonline.com/158705115X/ch04#ch04
  • 8/12/2019 The Attack Process

    36/55

    http://my.safaribooksonline.com/158705115X/ch05#ch05http://www.dcphonehome.com/http://my.safaribooksonline.com/158705115X/ch01#ch01
  • 8/12/2019 The Attack Process

    37/55

    http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch06lev1sec2#ch06lev2sec9
  • 8/12/2019 The Attack Process

    38/55

  • 8/12/2019 The Attack Process

    39/55

  • 8/12/2019 The Attack Process

    40/55

    http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch06lev1sec7#ch06lev1sec7
  • 8/12/2019 The Attack Process

    41/55

  • 8/12/2019 The Attack Process

    42/55

  • 8/12/2019 The Attack Process

    43/55

    http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch06lev1sec7#ch06lev1sec7
  • 8/12/2019 The Attack Process

    44/55

  • 8/12/2019 The Attack Process

    45/55

    http://www.slashdot.org/
  • 8/12/2019 The Attack Process

    46/55

    http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch06lev1sec2#ch06lev2sec11
  • 8/12/2019 The Attack Process

    47/55

    http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch06lev1sec5#ch06lev1sec5http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch06lev1sec2#ch06lev4sec2
  • 8/12/2019 The Attack Process

    48/55

    http://www.atstake.com/research/tools/network_utilities/
  • 8/12/2019 The Attack Process

    49/55

  • 8/12/2019 The Attack Process

    50/55

    http://monkey.org/~dugsong/dsniff/
  • 8/12/2019 The Attack Process

    51/55

    http://ettercap.sourceforge.net/
  • 8/12/2019 The Attack Process

    52/55

    http://www.caida.org/analysis/security/code-red/http://www.cert.org/advisories/CA-2001-19.htmlhttp://www.cert.org/advisories/CA-1999-04.html
  • 8/12/2019 The Attack Process

    53/55

    http://www.cert.org/advisories/CA-2001-26.html
  • 8/12/2019 The Attack Process

    54/55

    http://www.chkrootkit.org/
  • 8/12/2019 The Attack Process

    55/55

    http://bo2k.sourceforge.net/