[986] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Hacking the LAN

daemon@ATHENA.MIT.EDU (Kim Wohlert)
Thu Oct 5 11:14:25 1995

Date: Thu, 05 Oct 1995 12:23:49 +0100 (MET)
From: Kim Wohlert <Kim.Wohlert@mainz.dk>
To: jgilbert@digivis.com (John Gilbert), www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

At 21.53 04-10-1995 -0500, John Gilbert wrote:
>We are interested in analyzing a client's Internet connection to their
>(large, 2000-user) internal LAN. There are concerns that their other
>systems (behind the SCO UNIX, NCSA HTTP Web server) are open to
>attack/infiltration.
>
>Any recommendations on analysis tools? SATAN, Network General SNIFFER, etc.??
>
>Please advise,
>
>John Gilbert
>

Knowledge is the primary tool you need - if you don't have that, all other
tools will get you nothing but questionmarks and a false sense of security.

All that knowledge is NOT something you gain overnight by reading a few
books, but comes from working with TCP/IP and security issues over some
lenght of time.

Regards

Kim
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Kim Wohlert           |Internet:Kim.Wohlert@mainz.dk
erik mainz a/s        |X.400: c=DK a=DK400 p=Minerva
Dortheavej 7          |o=mainz s=Wohlert g=Kim
DK-2400 Copenhagen    |Phone:        +45 38 34 77 88
Denmark               |Fax:          +45 31 19 16 25
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
I guess sometimes there just aren't enough stones to throw.
                                             -Forest Gump


home help back first fref pref prev next nref lref last post