Know your enemy III# Security - 系统安全
z*w
1 楼
They Gain Root
Know Your Enemy: III
Lance Spitzner
http://www.enteract.com/~lspitz/papers.html
Last Modified: 27 March, 2000
This article is the third of a series focusing on the script
kiddie. The first paper focuses on how script kiddies probe
for, identify, and exploit vulnerabilities. The
second paper focuses on how you can detect these attempts,
identify what tools they are using and what vulnerabilities
they are looking for. This paper, the third,
focuses on what happens once they gain
Know Your Enemy: III
Lance Spitzner
http://www.enteract.com/~lspitz/papers.html
Last Modified: 27 March, 2000
This article is the third of a series focusing on the script
kiddie. The first paper focuses on how script kiddies probe
for, identify, and exploit vulnerabilities. The
second paper focuses on how you can detect these attempts,
identify what tools they are using and what vulnerabilities
they are looking for. This paper, the third,
focuses on what happens once they gain