If you aren't scared yet, here is some additional reading material to help. DoS and buffer overflow attacks are two of the most common and dangerous attacks that can be launched against your system. It's a good idea to have as much knowledge about the cracker as they have about you.
SYN Flood , Internet Security Systems, http://www.iss.net/security_center/advice/Exploits/TCP/SYN_flood/default.htm
Denial of Service Attack Resources Page , http://www.denialinfo.com/
CERT/CC Denial of Service , CERT, http://www.cert.org/tech_tips/denial_of_service.html
Strategies to Protect Against Distributed Denial of Service Attacks , Cisco, http://www.cisco.com/warp/public/707/newsflash.html
Help Defeat Denial of Service Attacks: Step-by-Step , SANS Institute, http://www.sans.org/dosstep/
Inside the Buffer Overflow Attack: Mechanism, Method, & Prevention , http://www.sans.org/rr/code/inside_buffer.php
Writing Buffer Overflow Exploits ”a Tutorial for Beginners , http://www. securiteam .com/securityreviews/5OP0B006UQ.html
Simple Buffer Overflow Exploits , fides, http://www.collusion.org/Article.cfm?ID=176
Attacking Servers Through a Buffer Overflow , http://www.entercept.com/ whitepaper /attackertools/buffer.asp
Introduction to ARP Spoofing , Sean Whalen, http://packetstormsecurity.com/papers/protocols/intro_to_arp_spoofing.pdf
Man-in-the-Middle Attack ”A Brief , Bhavin Bharat Bhansali, http://www.sans.org/rr/threats/middle.htm
Session Hijacking , Internet Security Systems, http://www.iss.net/security_center/advice/Exploits/TCP/session_hijacking/default.htm
A Simple Active Attack Against TCP /IP , Laurent Joncheray, http://www.cotse.com/ texts /iphijack.txt
Dave Dittrick's Security Links , http://www.washington.edu/People/dad/
Hunt ”Hijacking Tool , Pavel Krauz, http://lin.fsid.cvut.cz/~kra/index.html
Recognizing and Recovering from Rootkit Attacks , David O'Brien, http://www.cs.wright.edu/people/faculty/pmateti/Courses/499/Fortification/obrien.html
Understanding Rootkits , Oktay ALtunergil, http://linux.oreillynet.com/pub/a/linux/2001/12/14/rootkit.html
Analysis of the T0rn rootkit , Sans Institute, http://www.sans.org/y2k/t0rn.htm
Rootkit FAQ , David Dittrick, http://staff.washington.edu/dittrich/misc/faqs/rootkits.faq
Top |