Dailydave mailing list archives

Re: Re: How T-Mobil's network was compromised - Honeypots & Case Studies


From: Peter Busser <busser () m-privacy de>
Date: Wed, 23 Feb 2005 09:29:53 +0100

Hi!

On Sunday 20 February 2005 06:30, gf gf wrote:
*But*, I'd like to address the initial question as
well.  A lot of knowledge has been amassed on the
majority of attacks - simple, one shot vulnerabilites.
 But we have very little communal research and
documentation about the high level attacks, the ones
that succeed on highly protected, multiple lines of
defense, systems.  I think, as a community, we'd
benefit a lot from learning about these.

Isn't attacking a highly protected system just a matter of finding many 
security holes, instead of just one or two?

There is at least some historic information about how attacks like these take 
place. In the '80's there were a number of books published about hacking. 
They often featured transcripts and descriptions of hacking sessions. And 
there is of course The Cuckoo's Egg. Perhaps there are other, similar 
publications.

Groetjes,
Peter.
_______________________________________________
Dailydave mailing list
Dailydave () lists immunitysec com
https://lists.immunitysec.com/mailman/listinfo/dailydave


Current thread: