Used to protect against IP spoofing and source routing
Used to provide security for general Internet services
Used for remote scanning of Unix and firewall systems
Used to reduce system vulnerability to .rhosts attacks
Features of the Client/Server authentication exchange:
The client uses the session key from the credentials obtained for the server for a KRB_AP_REP
The client and server share an encryption key that can be used by the application
The client verifies that the timestamp field matches that in the authenticator it sent to the server
Begins with a prefix followed by a colon and the rest of the name
Consists of components separated by periods
Contains an equals sign with the components separated by slashes
Steps used in the authentication process of Kerberos are sequenced as:
@ The client sending a request to the Authentication Server for a ticket
B: The TIcket Granting Ticket being supplied to the client
C: The client requesting a ticket from the Ticket Granting Server
D: A Ticket for the application server or the TIcket Granting Server being provided
E: The Client transmitting the ticket containing the client's identity
F: The session key shared by the client authenticating the client and the server
Steps involved in the search for network vulnerabilities by SATAN:
Scanning the hosts within a proximity level away from the target
Generating reports from the database with the search information
Initiating a search when informed about the target.
1 Local users gain read access to files on the local system
2 Local users gain execute access to nonroot-owned files
3 Local users gain write access to root-owned files
4 Remote users gain read access to files on the system
5 Remote users gain execute access to nonroot-owned files
8 Remote users across a firewall gain write access to files
Method involved in the phase of obtaining
...