![]() ![]() The PacketStorm Web site bills itself as an online security library. Ping: This utility for TCP/IP-based networks sends a query packet to a target network user or host address and waits for a reply to confirm its presence on the network. ![]() TCP/IP fingerprinting: The process of analyzing the TCP/IP protocol stack of a target host computer on a network to discover its operating system and version. Intrusion detection software: Specialized security programs that monitor log-on attempts, security logs and other information to try to detect unauthorized attempts to access the corporate network. Gray hats are somewhere between the two, and nobody knows where Red Hat Linux fits in with all this. Basically, white hats are the good guys black hats are the bad guys. By contrast, black hat hackers hack maliciously. White hat is a fairly common term for people who hack legitimately - security staff, researchers and so on. This "white hat" nomenclature confused me when I first heard it. This week, I've had a bit of a chance to play around with them. Last week, I spent most of my time installing Linux and a few white hat applications from hacker Web sites: Firewalk, Nmap, Sniffit, Swatch and Tripwire. Using downloaded hacker utilities, Jude probes his network - and goes undetected
0 Comments
Leave a Reply. |