4. Conclusion
There are many weaknesses that can be exploited by an ill-intentioned person wishing to gain unauthorized access to private information, or to prevent a computer network, whether wired or wireless, from functioning properly. What's more, all the possibilities for doing harm that have been outlined have never been based on the principle of network equipment intrusion, which is the ultimate means for a hacker to make the network do what he or she wants, but solely on the weaknesses of the TCP/IP protocol and the network services ensuring its correct operation. Finally, we haven't shown how some of these techniques used together complement each other to considerably increase their damaging power. As can be seen, the most recent worms, which in a single infection prevent the antivirus from updating itself by pointing all the machine names of antivirus vendors to 127.0.0.1 (localhost ), install...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Conclusion
Bibliography
Requests For Comments
Standard
- Information Technology – Telecommunications and information exchange between systems – Local and metropolitan networks – Common specifications – Part 3: Media access control bridges - ISO/IEC 15802-3 - 1998
Website
The Unofficial 802.11 Security Web Page http://www.drizzle.com/~aboba/IEEE
Tools
Taranis http://www.bitland.net/taranis
WEPCrack http://wepcrack.sourceforge.net
Macof http://security.royans.net/info/rawip/code/macof.shtml
...Organizations
Lawrence Berkeley National Laboratory's Network Research Group http://www-nrg.ee.lbl.gov
Computer Emergency Response Team – Industrie Services et Tertiaire (CERT-IST) http://www.cert-ist.com
Internet Assigned Numbers Authority (IANA)...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference