Network Security: An MPE/iX Overview
page 197/22/2008
HP presentation template user tutorial
GENERAL NETWORKING
• Methods of Attacking the Network (cont)
– Port scanning
• Automated process that looks for open networking ports
• Logs positive hits for later exploits
– Buffer overrun packets
• Attacker sends carefully built packet to computers on network that
support specific services. (E-mail, IIS)
• Packet causes accepting process to abort, leaving system in
unknown state, potentially with root access
• Packet contains code that executes to get root access.