Home ] Up ] Games ] EL3209 ] Introduction ] Latest Update ]

 

 

What are they?

Common Gateway Interface (CGI) Packet Handling Function (PHF)

Packet Handling Function (PHF) is a program of how to write your own Common Gateway Interface (CGI) code, such as one that searches a database.

Password Sniffing

The simplest and most common attacks, using tools like TCP Grab and Passfinder, which can be downloaded from the Internet. Using these tools, the hacker could get into the website through the FTP port and then ran a password-sniffing program to steal passwords and create a new bogus homepage for the site.

Web Spoofing

A hacker such as Mitnick, poses as a legitimate host using a fabricated IP address. That tricks the firewall into letting the intruder through the network. The hacker sets up a fake Web site to lure users in hopes of stealing their credit card numbers or other information.

Synchronized number sequence (SYN) Flood

The hacker forged an IP source address on a SYN packet, which is basically a synchronisation packet for TCP traffic. The hacker continues to bombard the host, which typically supports about eight to sixteen simultaneous communications channels or entries. Such attacks do not hit the actual systems. They generally wreak havoc on the network, sometimes shutting down the service temporarily.

Ping o' Death

It is a program which the hacker could use to send a "ping" message of greater than 65,536 bytes. The default size is 64 bytes. The Ping o' Death can crash or reboot a large number of systems.

Domain Name Service (DNS) hijacking

The hacker redirects all queries for one domain such as whitehouse.gov., to another site, such as dilbert.com. It is like swapping the White House phone number in the phonebook with a massage parlor's. It is generally done to interrupt commerce at a particular Web site or out of mischief.