anatomy of an attack
TRANSCRIPT
![Page 1: Anatomy Of An Attack](https://reader031.vdocuments.us/reader031/viewer/2022020101/55aac0501a28abee758b4573/html5/thumbnails/1.jpg)
Anatomy of an Attack: Persist
• SubSeven/Nimda/NetBus/SSH/Storm – trojan• NetCat – general TCP/UDP tool• John the Ripper/L0phtCrack – password cracker
# pseudo code for brute password cracker
while ($temp not equal $hash) {
increment ($password);
$temp=digest ($password);
}
print ($password);
![Page 2: Anatomy Of An Attack](https://reader031.vdocuments.us/reader031/viewer/2022020101/55aac0501a28abee758b4573/html5/thumbnails/2.jpg)
Anatomy of an Attack: Propagate
• Worms• Spyware/Trojans• Email/IRC virii• Boot sector (esp. floppy) virii• Zombies
Worm structure:
![Page 3: Anatomy Of An Attack](https://reader031.vdocuments.us/reader031/viewer/2022020101/55aac0501a28abee758b4573/html5/thumbnails/3.jpg)
Anatomy of an Attack: Paralyze
• Slow/Stop services• Steal/Modify important data• Vandalize (“tag”) hosts• Destroy hardware• Damage reputation
• Abuse users
• Take a network hostage• Frame an entity for harming another entity