|
Amateur Fortress Building in Linux |
by Sander Plomp |
| I installed Linux on my home system, and since it's connected to the Internet I had to secure it. The average distro comes with nice set of security holes you've got to plug first. You know the routine: edit inetd.conf and comment out all services you don't need .... I got bored with articles telling you to edit inetd.conf too. So I'm not going to do it the official way - I'm going to do it my way. |
|
Autopsy of a Successful Intrusion |
by Floydman |
| I am about to describe here is the complete story of two successful network intrusion, where we (quickly and rather easily) had complete access to everything. And these are networks owned by (apparently) respected big corporations, and were equiped with firewalls and antivirus software. And they still wonder why e-commerce never lived up to expectations? |
|
Cracking School Networks |
by protonigger |
| Find out what kind of idiots really run your school. |
|
Dr. AcoRed, or: How I Learned to Stop Worrying and Love BGP |
by Draco Red & Jason Argonaut |
| We're writing this in response to an article that was put out a few months ago, about the general state of security in internet routing protocols. For those of you who have invented your own mnemonic device to remember the OSI seven-layer model, you're already saying to yourself "Oh, my god--they'll kill the internet." For those of you with a little less training you'll soon learn why you should have that response to the phrase "routing protocol security". The short of it is because there is none. At all. Whatsoever. |
|
Eluding Network Intrusion Detection |
by Thomas H. Ptacek |
| In passive protocol analysis, the intrusion detection system (IDS) unobtrusively watches all traffic on the network, and scrutinizes it for patterns of suspicious activity. We outline in this paper two basic problems with the reliability of passive protocol analysis. |
|
Examining Port Scan Methods - Analysing Audible Techniques |
by dethy |
| I will attempt to enumerate a variety of ways to discover and map internal/external networks using signature-based packet replies and known protocol responses when scanning. Specifically, this document presents all known techniques used to determine open/closed ports on a host and ways an attacker may identify the network services running on arbitrary servers. |
|
IP-spoofing Demystified |
by Phrack Magazine |
| The purpose of this paper is to explain IP-spoofing to the masses. It assumes little more than a working knowledge of Unix and TCP/IP. |
|
Improving Your Site's Security by Breaking Into It |
by Dan Farmer |
| Dan Farmer's original paper Improving Your Site's Security by Breaking Into It , introduces his security software SATAN. |
|
Improving the Security of Your Site by Breaking Into it |
by Dan Farmer and Wietse Venema |
| Every day, all over the world, computer networks and hosts are being broken
into. The level of sophistication of these attacks varies widely; while it
is generally believed that most break-ins succeed due to weak passwords,
there are still a large number of intrusions that use more advanced
techniques to break in. Less is known about the latter types of break-ins,
because by their very nature they are much harder to detect. |
|
Investigating an Attempted Intrusion |
by OptikNerve |
| When activity occurs that you think could be intruders, there are 4 steps you can take to see if this is an attempted break-in or not. |
|
MAC Addressing Demystified |
by protonigger |
| Understanding the network by understanding its hardware. |
|
Methodoloy of Firewall Penetration Testing |
by Reto Haeni |
| First, we want to find out as much as possible about our target. To do so, we collect information first in a way that can not be detected by any logging or alarming system. For this step, we use publicly available information from sources outside the network. |
|
Netbios for newbs |
by Nbtstatman |
| Another fileshare tutorial. |
|
The Networked Unix: TCP/IP |
by Solid State |
| Guidance on features of the TCP-IP (Internet Transmission Control Protocol) architecture, such as FTP, TFTP, TELNET, SMTP, and the UNIX Remote Execution Facilities. |