[986] in WWW Security List Archive
Re: Hacking the LAN
daemon@ATHENA.MIT.EDU (Kim Wohlert)
Thu Oct 5 11:14:25 1995
Date: Thu, 05 Oct 1995 12:23:49 +0100 (MET)
From: Kim Wohlert <Kim.Wohlert@mainz.dk>
To: jgilbert@digivis.com (John Gilbert), www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu
At 21.53 04-10-1995 -0500, John Gilbert wrote:
>We are interested in analyzing a client's Internet connection to their
>(large, 2000-user) internal LAN. There are concerns that their other
>systems (behind the SCO UNIX, NCSA HTTP Web server) are open to
>attack/infiltration.
>
>Any recommendations on analysis tools? SATAN, Network General SNIFFER, etc.??
>
>Please advise,
>
>John Gilbert
>
Knowledge is the primary tool you need - if you don't have that, all other
tools will get you nothing but questionmarks and a false sense of security.
All that knowledge is NOT something you gain overnight by reading a few
books, but comes from working with TCP/IP and security issues over some
lenght of time.
Regards
Kim
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Kim Wohlert |Internet:Kim.Wohlert@mainz.dk
erik mainz a/s |X.400: c=DK a=DK400 p=Minerva
Dortheavej 7 |o=mainz s=Wohlert g=Kim
DK-2400 Copenhagen |Phone: +45 38 34 77 88
Denmark |Fax: +45 31 19 16 25
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
I guess sometimes there just aren't enough stones to throw.
-Forest Gump