Left Quote    A clever person solves a problem. A wise person avoids it.
- Einstein    
Right Quote
[login] | [Register]

Computer Attacks

by: Anon.
Page: 3 of 5
(View All)


  1. Sendmail: Sendmail is an extremely old program that has had vulnerabilities throughout its history. Sendmail is proof that complex software is rarely completely patched because developers constantly add new features that introduce new vulnerabilities. Recent attacks against sendmail fell into the categories of remote penetration, local penetration, and remote denial of service.
  2. ICQ: ICQ is a sophisticated chat program that stands for "I-Seek-You." It is currently owned by America Online and used by over 26 million users. In the past year, several ICQ attacks were developed that allowed one to impersonate other people and decrypt "encrypted" traffic. An attacker would use these attacks by going to a chat room and finding two people that are friends. The attacker then pretends to be someone's friend and sends them a Trojan horse (malicious code embedded into a legitimate program) via ICQ.
  3. Smurf: Smurf uses a network that accepts broadcast ping packets to flood the target with ping reply packets. Think of smurf as an amplifier allowing an attacker to anonymously flood a target with a huge amount of data.
  4. Teardrop: Teardrop freezes vulnerable Windows 95 and Linux hosts by exploiting a bug in the fragmented packet re-assembly routines.
  5. IMAP: The Internet Message Access Protocol (IMAP) allows users to download their e-mail from a server. Last year, IMAP server software was released with a vulnerability that allows a remote attacker to gain complete control over the machine. This vulnerability is extremely important because a large number of mail servers use the vulnerable IMAP software.
  6. Back Orifice: Back Orifice is a Trojan horse that allows a user to control remotely a Windows 95/98 host with an easy-to-use GUI (Graphical User Interface).
  7. Netbus: Netbus is similar to Back Orifice but it works against Windows NT as well as Windows 95/98.
  8. WinNuke: WinNuke freezes a Windows 95 host by sending it out-of-band TCP data.
  9. Nmap: Nmap is a sophisticated network-scanning tool. Among other features, nmap can scan using a variety of protocols, operate in stealth mode, and automatically identify remote operating systems.

  10. 1  |  2  |  3  |  4  |  5  |  
    Next »

    No Comments for this page.

    You Must be logged in or a member to comment.

Tutorial Stats

Tutorial Stats

0 Total Comments
0 Rating of 5 ( Votes)


Tutorial Options

· Login to Rate This Article
· Login to Post a Comment
· Read more by this author
Digg This Article! Bookmark This Article Reddit: Bookmark This Article BlinkList: Blink This Article! YahooMyWeb BlogMarks: Add This Mark! Furl: Save This Article Spurl: Mark This Article



· Anonymity via Proxy
· Your Browser Cookies
· Controlling your JavaScript
· Protect Against Spyware

"" Copyright © 2002-2019; All rights lefted, all lefts righted.
Privacy Policy  |  Internet Rank