Additional Resources

   

If you aren't scared yet, here is some additional reading material to help. DoS and buffer overflow attacks are two of the most common and dangerous attacks that can be launched against your system. It's a good idea to have as much knowledge about the cracker as they have about you.

  • SYN Flood , Internet Security Systems, http://www.iss.net/security_center/advice/Exploits/TCP/SYN_flood/default.htm

  • Denial of Service Attack Resources Page , http://www.denialinfo.com/

  • CERT/CC Denial of Service , CERT, http://www.cert.org/tech_tips/denial_of_service.html

  • Strategies to Protect Against Distributed Denial of Service Attacks , Cisco, http://www.cisco.com/warp/public/707/newsflash.html

  • Help Defeat Denial of Service Attacks: Step-by-Step , SANS Institute, http://www.sans.org/dosstep/

  • Inside the Buffer Overflow Attack: Mechanism, Method, & Prevention , http://www.sans.org/rr/code/inside_buffer.php

  • Writing Buffer Overflow Exploits ”a Tutorial for Beginners , http://www. securiteam .com/securityreviews/5OP0B006UQ.html

  • Simple Buffer Overflow Exploits , fides, http://www.collusion.org/Article.cfm?ID=176

  • Attacking Servers Through a Buffer Overflow , http://www.entercept.com/ whitepaper /attackertools/buffer.asp

  • Introduction to ARP Spoofing , Sean Whalen, http://packetstormsecurity.com/papers/protocols/intro_to_arp_spoofing.pdf

  • Man-in-the-Middle Attack ”A Brief , Bhavin Bharat Bhansali, http://www.sans.org/rr/threats/middle.htm

  • Session Hijacking , Internet Security Systems, http://www.iss.net/security_center/advice/Exploits/TCP/session_hijacking/default.htm

  • A Simple Active Attack Against TCP /IP , Laurent Joncheray, http://www.cotse.com/ texts /iphijack.txt

  • Dave Dittrick's Security Links , http://www.washington.edu/People/dad/

  • Hunt ”Hijacking Tool , Pavel Krauz, http://lin.fsid.cvut.cz/~kra/index.html

  • Recognizing and Recovering from Rootkit Attacks , David O'Brien, http://www.cs.wright.edu/people/faculty/pmateti/Courses/499/Fortification/obrien.html

  • Understanding Rootkits , Oktay ALtunergil, http://linux.oreillynet.com/pub/a/linux/2001/12/14/rootkit.html

  • Analysis of the T0rn rootkit , Sans Institute, http://www.sans.org/y2k/t0rn.htm

  • Rootkit FAQ , David Dittrick, http://staff.washington.edu/dittrich/misc/faqs/rootkits.faq


   
Top


Mac OS X Maximum Security
Maximum Mac OS X Security
ISBN: 0672323818
EAN: 2147483647
Year: 2003
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net