Network Security: An MPE/iX Overview

page 197/22/2008
HP presentation template user tutorial
GENERAL NETWORKING
Methods of Attacking the Network (cont)
Port scanning
Automated process that looks for open networking ports
Logs positive hits for later exploits
Buffer overrun packets
Attacker sends carefully built packet to computers on network that
support specific services. (E-mail, IIS)
Packet causes accepting process to abort, leaving system in
unknown state, potentially with root access
Packet contains code that executes to get root access.