Improving the Security of Your School by Breaking Into It

8/17/2000


Click here to start


Table of Contents

Improving the Security of Your School by Breaking Into It

(With Apologies To Dan Farmer and Wietse Venema)

Request for Discretion

Background: The Incident

The NU Truth Revealed

PPT Slide

Let the Meetings Commence!

Now What Do I Do?

The Memorandum of Power

Goals

Goals (Subtext)

Requirements #1: The Team

Requirements #1: The Team (Subtext)

Requirements #2: Access

Requirements #3: Privacy

Requirements #4: Informed Written Consent

PPT Slide

Step 1: Remote Reconnaissance

Step 2: Find the Data

Step 3: Poke Around

Step 4: Sniff

Step 5: Active General Probing

Step 6: You've Got Root!

Game Over!

The Report

Parting Observations #1

Parting Observations #2

PPT Slide

Author: David Blank-Edelman

Email: dnb@ccs.neu.edu

Download presentation source