Beruflich Dokumente
Kultur Dokumente
Computer Hacking
1
Some History of Hacking
• Hacking Schools
Zi Hackademy, Paris
Civil Hackers school, Moscow
• Hacking Classes
This class
Government Training
Company training
http://www4.law.cornell.edu/uscode/18/
What corrections and or improvements do you suggest for this lab? Please be very specific and if you
add new material give the exact wording and instructions you would give to future students in the
new lab handout. You may cross out and edit the text of the lab on previous pages to make minor
corrections/suggestions. General suggestions like add tool xyz to do more capable scanning will not
be awarded extras points even if the statement is totally true. Specific text that could be cut and
pasted into this lab, completed exercises, and completed solutions may be awarded additional credit.
Thus if tool xyx adds a capability or additional or better learning experience for future students here
is what you need to do. You should add that tool to the lab by writing new detailed lab instructions
on where to get the tool, how to install it, how to run it, what exactly to do with it in our lab, example
outputs, etc. You must prove with what you turn in that you actually did the lab improvement
yourself. Screen shots and output hardcopy are a good way to demonstrate that you actually
completed your suggested enhancements.
“UNIVERSITY” R3 .151
EB GP .1 #4 Sigm a2-rtr
“BAD ISP”
AS 64900 EB GP .41 C isco 2621-XM AS 64700
University Webserver
62.7.200.32/30:309
Redhat Apache
http://ww w.university.edu 138.210.240.0/24:210
.10 199.77.33.0/30:303 199.110.254.40/30:307
S4 .1 .42
.34
XP honeypot 138.210.228.0/24:211
.2
EBG P EB GP .1
HUB
G ateway2-rtr .1 57.35.7.0/24:250 S2
#14 .1 #15
S4 Cisco 3550-24-EM I (L3)
.1 .1 .17 .254
Bridge CS-rtr
.11 Cisco 1760 Badisp-rtr Badisp-dns
S4 Cisco 3550-24-EMI (L3) Dell Pow eredge
.3 .5
Redhat honeypot 138.210.251.0/24:200
.1 138.210.231.0/24:201
H oneynet #16 S2 57.35.0.0/30:253
.1
.4 U niversity-dns
Admin-rtr .2 StorageRus-rtr 57.35.0.16/30:252
Dell Pow eredge
#22
PWR
OK
WIC0
ACT/CH0
ACT/CH1
WIC0
ACT/CH0
ACT/CH1
ETH
ACT
COL
Cisco 1760-K9 .1 1760-K9
Admin-vpn .254 .2 .1 .18
138.210.237.0/24:207 138.210.232.0/24:202 #19
Cisco VPN #17 .1
.1 .1 .1 .1
Conc. 3005
.1 #20
138.210.233.0/24:203 57.35.5.0/24:258 Cust2-rtr
138.210.238.0/24:208
192.168.110.0/24:209 57.35.10.0/24:260 Cisco 1760.1 57.35.3.0/24:256
138.210.234.0/24:204 R5
R6
.2 .10 .16
57.35.6.0/24:259
.42 .43 138.210.235.0/24:205 .100 S3 57.35.4.0/24:257
.1 .8
R4 R7 .9 .11 - .200 .5 StorageRus W ebserver
CS W ebserver #18 .1 Adm in Webserver S5 MS IIS
CS Ftp Server MS IIS NAS
Redhat Apache CS2-rtr http://w ww.storagerus.com
Redhat
http://ww w.cc.university.edu Cisco 1760
R IP
138.210.236.0/24:206 O SPF 0 http://www .admin.university.edu Dell Network
Attached Storage Viz Printer W 1 ... … W 24 TA1 17
References
1. Pfleeger, Charles. (2000). Security In Computing (2nd ed.). Upper Saddle River, NJ: Printice Hall PTR.
6. Georgia Computer Systems Protection Act. Last Modified: June 29, 2002. http://www.security.gatech.edu/policy/law_library/gcspa.html
7. Title 18, Part 1, Chapter 119, Section 2511 – Interception and disclosure of wire, oral, or electronic communications prohibited. US Code Collection.
http://www4.law.cornell.edu/uscode/18/2511.html
8. Title 18, Part 1, Chapter 121, Section 2701 – Unlawful access to stored communications. US Code Collection. http://www4.law.cornell.edu/uscode/18/2511.html
9. Minow, Mary. The USA PATRIOT Act and Patron Privacy on Library Internet Terminals. February 15, 2002. http://www.llrx.com/features/usapatriotact.htm
10. Bush Homeland Security bill nears passage by US Congress. The Editorial Board. November 18, 2002.
http://www.wsws.org/articles/2002/nov2002/home-n18.shtml
11. Georgia Institute of Technology Computer and Network Usage Policy. Office of Information Technology. Last Modified October 20, 2003. http://
www.oit.gatech.edu/information_security/policy/usage/
12. Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues for Computers and the Internet. 2nd edition. Prentice Hall. 2003. Page 289.
13. Palmer, C.C. Ethical Hacking. International Business Machines Corporation. Copyright 2001. www.research.ibm.com/journal/sj/403/palmer.html
14. Harvey, Brian. Computer Hacking and Ethics. April 1985. www.cs.berkeley.edu/~bh/hackers.html
15. Shell, Barry. Ethical Hacking. Georgia Straight Weekly, Vancouver, BC. September 14, 2000. http://css.sfu.ca/update/ethical-hacking.html
ECE 4110 - Internetwork Security 18