TAILIEUCHUNG - Intrusion Detection Overview and Trends in Internet Attacks

An important lesson to share is that you should always test attack tools in a lab environment -- never on a live network. Over the years I have been amazed at how well I can break networks simply by scanning them. Needless to say, the owners of the networks are not always overjoyed, and it is great to be able to demonstrate that I tested them in a lab BEFORE I let them loose on a live, production network. | Intrusion Detection Overview and Trends in Internet Attacks Bad things that happen to good organizations Internet Threat Brief SANS GIAC LevelOne 2000 1 Hello. My name is Stephen Northcutt. Today we are going to discuss some of the common attacks levied against individuals and organizations who are on the Internet. Though this is a tool-oriented technology brief I would like to state one thing up front tools are not attacking your sites people are. There are a large number of loosely organized skilled individuals across the Internet who are focused on building and using attack tools to take over systems and use them for their own purposes. We will demonstrate that these attacks range from your home computer connected to your ISP all the way to the largest and most advanced organizations on the Internet. To get the most out of this briefing you should have completed the IP Concepts and IP Behavior courses. However we will explain the material as we go. 1 Outline Modems and what they mean Trojans Scanning and attack tools What do those tools mean What I m doing. Internet Threat Brief SANS GIAC LevelOne 2000 2 Important public safety announcement we are going to mention several tools during this talk. We will even provide URLs for some of these so that you can use them to test these techniques out yourself. Keep in mind you could end up in trouble if you misuse these. An important lesson to share is that you should always test attack tools in a lab environment -never on a live network. Over the years I have been amazed at how well I can break networks simply by scanning them. Needless to say the owners of the networks are not always overjoyed and it is great to be able to demonstrate that I tested them in a lab BEFORE I let them loose on a live production network. Also please only test on your own network don t probe systems that you do not own. People really do get fired and even prosecuted be certain to have permission before testing any attack or scanning tool. 2 .

TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.