Check out the new USENIX Web site. LISA '97 Conference
 
 
Table of Contents
T5   Network Security Profiles: What Every Hacker Already Knows About You, and What To Do About It   NEW!
Jon Rochlis and Brad Johnson, SystemExperts Corp.

Who should attend: People responsible for network-based applications or systems that might be targets for hackers, or who are proactively improving the security of their hosts, using any type of TCP/IP-based system. You should understand the basics of TCP/IP networking. Examples may use UNIX com mands or include C or scripting languages.

What you will learn: How to prepare for attacks and proactively stave them off.

There are four common stages to network-based host attacks: reconnaissance, target selection, exploitation, and cover-up. This course will review the tools and tech niques hackers use in attacks. You will learn how to either be prepared for such attacks or how to stay one step ahead of them. You will learn how to generate profiles of your systems remotely and show some of the business implications of these network-based probes.

The course will focus primarily on tools that exploit many of the common TCP/IP-based protocols (such as ICMP, SNMP, RPC, HTTP, and SMTP) which support virtually all of the Internet applications--such as mail, Web technologies, network management, and remote file systems. Many topics will be addressed at a detailed technical and administrative level. We will primarily use examples of public domain tools because they are widely available and commonly used in these types of situations.

Topics include:

- Review of network attack methodology: Reconnaissance, target selection, exploitation, and cover-up
- Attack profiles: What does one look like?
- Techniques: Scanning, CERTs, and hacking clubs
- Tools: scotty, strobe, SATAN, ISS, etc.
- Business exposures: Integrity and confidentiality, audits, and intrusion resolution

RochlisJon Rochlis is a senior consultant for SystemExperts Corp. He provides high-level advice on network security, distri buted systems design and management, high-availa bility, and electronic commerce. Before joining SystemExperts, he was engineering manager with BBN Planet.

Johnson_BradCBrad Johnson is an authority in the field of distributed systems. He has participated in seminal industry initiatives such as the Open Software Foundation, X/Open, and the IETF, and has published often about open systems. Brad works at SystemExperts where he has led numerous security probes for major companies.

Tutorials at-a-Glance     Tutorial Instructors

 
 


Conference at-a-Glance - Tutorials - Technical Program - Registration -
BoF Sessions - Conference Info - Hotel & Travel Info - LISA 97 brochure HOME
Conference Index
Events Calendar
USENIX home