Hour 19. What Hackers Do
What You'll Learn in This Hour:
Types of intruders
Goals of the intruder
Intrusion techniques
When the experts started designing networks, they had no idea that legions of unauthorized users would spend thousands of hours trying to get inside. This hour describes some of the methods used for network attacks.
At the completion of this hour, you'll be able to
Describe how hackers obtain passwords
Describe how intruders access systems using buffer overflow, script tricks, session hijacking, and email worms
Discuss methods for establishing permanent control of a system
Describe denial-of-service attacks
Get Sams Teach Yourself TCP/IP in 24 Hours, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.