WAN-hacking with AutoHack: Auditing Security Behind the Firewall
نویسنده
چکیده
This paper is a review of an ongoing project to sim plify security auditing of the world wide tcp ip net work of some thirty thousand hosts internal to Sun Microsystems The paper also examines the issues which this pro ject raises it details the conception design develop ment of and one year s results gathered from Auto Hack a tool specially created to probe audit and produce security reports for a tcp ip network of this size
منابع مشابه
Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available
Stuart McClure is the lead author of the best-selling security book Hacking Exposed: Network Security Secrets and Solutions (Osborne/McGraw-Hill), and since 1998 has been co-authoring the weekly “Security Watch” column in InfoWorld. Previously, as Security Analyst for the InfoWorld Test Center, he evaluated almost 100 network and security products in the area of firewalls, security auditing, in...
متن کاملDeterring Hacking Strategies via Targeting Scanning Properties
Network infrastructures have played important part in most daily communications for business industries, social networking, government sectors and etc. Despites the advantages that came from such functionalities, security threats have become a daily struggle. One major security threat is hacking. Consequently, security experts and researchers have suggested possible security solutions such as F...
متن کاملWireless Network Security Using Raspberry Pi
This educational project uses a second generation Raspberry Pi that runs multiple Open Source software packages, to perform network penetration testing and to analyze the results. Implementing this project provides undergraduate students with practical hands-on experience and explains advanced concepts in computer hardware, operating systems, and network security. This project is fairly afforda...
متن کاملDistributed Firewall Policy Validation
With hacking attempts, the cost of security breaches, and the importance of defensive computer security in general all on the rise, strong firewalls are more relevant than ever. At the same time, demands for software diversity and increasingly complex network layouts make evaluating adherence to a unified security policy especially difficult. In this paper, I propose a method of uniformly valid...
متن کاملA survey on the approaches in honeypot for implementing network security
Honeypot is a supplemented active defence system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, honeypot can solve many traditional dilemmas. It has emerged as a prominent technology that helps learn new hacking techniques from...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1995