Chapter 5. Common Hacker Attacks

   


In this chapter, you cover common attacks that you should be expecting and prepared to block. Many of them you might have heard about, but do not understand. They are explained in detail and defenses are offered.

The topics covered in this chapter include:

  • "Rootkit Attacks (Script Kiddies)" on page 237

  • "Packet Spoofing Explained" on page 239

  • "SYN Flood Attack Explained" on page 245

  • "Defeating SYN Flood Attacks" on page 245

  • "Defeating TCP Sequence Spoofing" on page 246

  • "Packet Storms, Smurf Attacks, and Fraggles" on page 246

  • "Buffer Overflows or Stamping on Memory with gets()" on page 252

  • "Spoofing Techniques" on page 253

  • "Man-in-the-Middle Attack" on page 257


   
Top


Real World Linux Security Prentice Hall Ptr Open Source Technology Series
Real World Linux Security Prentice Hall Ptr Open Source Technology Series
ISBN: N/A
EAN: N/A
Year: 2002
Pages: 260

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net