IDS mailing list archives

Re: Evasion schemes or techniques


From: "Gurpreet Singh" <gurpreetsl () gmail com>
Date: Wed, 13 Dec 2006 16:16:12 +0530

hi,

these are the most common attacks we encounter in our daily life.  You
can google the following terns and you will get a lot of material
otherwise i can provide you with some links.

Hacking: types of attack

viruses - most common form of attack

denial of service attacks

trojans (or trojan horses)

brute-force and `social engineering' password attacks

port scanning and spoofing

phishing



Viruses

Easily transferred in emails or downloaded files

May damage data on infected computer

May allow privileged access to host

May flood the network with spurious data



Phishing

This is a method of luring an unsuspecting user into giving out their
username and password for a secure web resource, usually a bank or
credit card account. Ebay and PayPal are particularly susceptible to
this type of attack.

usually achieved by creating a website identical to the secure site

user is sent email requesting them to log in, and providing a link to
the bogus site

when user logs in, password is stored and used to access the account
by the attacker

difficult to guard against, particularly if using HTML email


Currently no law specifically against this, though some experts think
this may come under the Computer Misuse Act, and may also be testable
under trademark laws (passing off as another's web site).

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more.
------------------------------------------------------------------------


Current thread: