Initial Network Attack by Mitnik
Mitnik used weaknesses in the TCP/IP implementation
- IP Spoofing
- TCP Sequence Prediction
Steps taken by the attacker
- Information gathering phase
- Examining trust relationships
- ‘Gagging’ trusted host
- Spoofing trusted host
- Sequence Prediction
- Data Exchange
- Host Level Attacks