[34740] in bugtraq

home help back first fref pref prev next nref lref last post

Multi stage attacks on networks?

daemon@ATHENA.MIT.EDU (Sudhakar-bugtraq Govindavajhala)
Fri Apr 30 18:29:34 2004

Date: Thu, 29 Apr 2004 19:35:55 -0400 (EDT)
From: Sudhakar-bugtraq Govindavajhala <sudhakar@CS.Princeton.EDU>
Reply-To: Sudhakar-bugtraq Govindavajhala <sudhakar+bugtraq@CS.Princeton.EDU>
To: bugtraq@securityfocus.com
Message-ID: <Pine.LNX.4.58.0404291924550.31473@tux.CS.Princeton.EDU>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII


Hi
	I am a Ph.D. student studying network security at Princeton
University.  I am trying to see if attacker can use a series of
vulnerabilities to take over a particular resource.  Has there been prior
work on this topic earlier? Can someone give me a real example where the
adversary actually uses  a series of vulnerabilities to break into a
resource?

	May be he uses the webserver in DMZ and then uses it to get access
to fileserver and then uses it to compromise something else?


thanks for your time,
Sudhakar.



Sudhakar Govindavajhala	                  Department of Computer Science
Graduate Student,                         Princeton University
                      (o) +1 609 258 1798
               http://www.cs.princeton.edu/~sudhakar

home help back first fref pref prev next nref lref last post