00. Computer Security Overview
http://www.securityfocus.com/
Attack Side
(hacker’s hut: http://www.win.tue.nl/~aeb/linux/hh/hh.html#toc10 )
- sniffing: collect info on packet data
- scanning: collect info on live ports
Breaking into the target system
- brute-force: password guessing
- unexpected input:
- buffer overflow, SQL injection, Cross-Site Scripting,
- format string, integer overflow, …
- unexpected behavior/protocol:
- MIM (Man In the Middle), application vulnerabilities, java vulnerabilities
- social engineering
Control the target system
- malware, ransomware, spyware : install attacker’s program
- kernel hacking : modify the kernel (LKM)
Block/Destroy target system
Defense Side
Detect/block the attack
- detect scanning
- detect attack packet: IDS
- block port: firewall
Make system/protocol/application secure
- encryption, secure os, SSL(secure socket layer), secure programming
Trace the attacker
- logging, ip trace, computer forensics