|
|
|
What are they?
Packet Handling Function (PHF) is a program of how to write your own Common Gateway Interface (CGI) code, such as one that searches a database.
The simplest and most common attacks, using tools like TCP Grab and Passfinder, which can be downloaded from the Internet. Using these tools, the hacker could get into the website through the FTP port and then ran a password-sniffing program to steal passwords and create a new bogus homepage for the site.
A hacker such as Mitnick, poses as a legitimate host using a fabricated IP address. That tricks the firewall into letting the intruder through the network. The hacker sets up a fake Web site to lure users in hopes of stealing their credit card numbers or other information.
The hacker forged an IP source address on a SYN packet, which is basically a synchronisation packet for TCP traffic. The hacker continues to bombard the host, which typically supports about eight to sixteen simultaneous communications channels or entries. Such attacks do not hit the actual systems. They generally wreak havoc on the network, sometimes shutting down the service temporarily.
It is a program which the hacker could use to send a "ping" message of greater than 65,536 bytes. The default size is 64 bytes. The Ping o' Death can crash or reboot a large number of systems.
The hacker redirects all queries for one domain such as whitehouse.gov., to another site, such as dilbert.com. It is like swapping the White House phone number in the phonebook with a massage parlor's. It is generally done to interrupt commerce at a particular Web site or out of mischief. |