Create your own awesome maps

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account?
Log In

Hacking All in One by Mind Map: Hacking All in One
0.0 stars - 0 reviews range from 0 to 5

Hacking All in One

Methods

Network security

physical access server -- reboot w pirate disk, SCSI access via laptop, issue commands in traditional manner

OS- windows, LINUX

SNMP tricks

Web component -- cold fusion

Applicatiion security

Humans -- social eng

How

Unsophisticated -- Run scripts that test security, ID problem areas

Sophisticated -- Recon, work but not too fast. Tedious

New node

Honeypot--only deals with direct attacks, not on other systems

Low interactive -- emulate systems, services

Port Listeners

Hi -- provide real system so complete behavior can be studied

Real services

IDS

Dorothy Denning

Conform to statistical predictable pattern

Do not include sequences and command

Conforms to set of specifcations

3 Kinds -- Signature, anaomaly, Decoy -- Honeypots

Network device to observe and protect

Snort -- lightwt-- runs on Windows, Linux, Open source network -- runs on a network to observe and protect, New node

Hype

tech trigger

peak of inflated expectations 2-5 yrs

trough of disillusionment 5-10 yrs

slope enlighteent

plateau of prouctict

IS Maturity

blissful ignorance

awareness

corrective

ops excellece

best way Google

anti virus

disable JAVA

DIS pdfS

POINTS

SECURITY PROCES Not TECH

TRUST

WEAKESST LINK

TRADEOFFS

Internet

packet switched std IP packets

TCP connect and Xfer data bwn 2 nodes and Ip