WAN-hacking with AutoHack: Auditing Security Behind the Firewall

نویسنده

  • Alec Muffett
چکیده

This paper is a review of an ongoing project to sim plify security auditing of the world wide tcp ip net work of some thirty thousand hosts internal to Sun Microsystems The paper also examines the issues which this pro ject raises it details the conception design develop ment of and one year s results gathered from Auto Hack a tool specially created to probe audit and produce security reports for a tcp ip network of this size

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available

Stuart McClure is the lead author of the best-selling security book Hacking Exposed: Network Security Secrets and Solutions (Osborne/McGraw-Hill), and since 1998 has been co-authoring the weekly “Security Watch” column in InfoWorld. Previously, as Security Analyst for the InfoWorld Test Center, he evaluated almost 100 network and security products in the area of firewalls, security auditing, in...

متن کامل

Deterring Hacking Strategies via Targeting Scanning Properties

Network infrastructures have played important part in most daily communications for business industries, social networking, government sectors and etc. Despites the advantages that came from such functionalities, security threats have become a daily struggle. One major security threat is hacking. Consequently, security experts and researchers have suggested possible security solutions such as F...

متن کامل

Wireless Network Security Using Raspberry Pi

This educational project uses a second generation Raspberry Pi that runs multiple Open Source software packages, to perform network penetration testing and to analyze the results. Implementing this project provides undergraduate students with practical hands-on experience and explains advanced concepts in computer hardware, operating systems, and network security. This project is fairly afforda...

متن کامل

Distributed Firewall Policy Validation

With hacking attempts, the cost of security breaches, and the importance of defensive computer security in general all on the rise, strong firewalls are more relevant than ever. At the same time, demands for software diversity and increasingly complex network layouts make evaluating adherence to a unified security policy especially difficult. In this paper, I propose a method of uniformly valid...

متن کامل

A survey on the approaches in honeypot for implementing network security

Honeypot is a supplemented active defence system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, honeypot can solve many traditional dilemmas. It has emerged as a prominent technology that helps learn new hacking techniques from...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995