Srusti Management Review (Jun 2009)
Secure your Data by Breaking into IT!
Abstract
In this paper we will take an unusual approach to system security. Instead of merely saying that something is a problem, and show _why_ it is one. y_ it is one. We will illustrate that even seemingly harmless network services can become valuable tools in the search for weak points of a system, even when these services are operating exactly as they are intended to. exactly as they are intended to. In an effort to shed some light on how more advanced intrusions occur, this paper , this paper outlines various mechanisms that crackers have actually used to obtain access to systems and, in addition, some techniques we either suspect intruder intruders of using, or that we have used ourselves in tests or in friendly/authorized environments. My motivation for writing this paper is that system administr administrators are often unaware of the dangers presented by anything beyond the most trivial anything beyond the most trivial attacks. attacks.