作者: Bill Cheswick
DOI:
关键词:
摘要: On 7 January 1991 a cracker, believing he had discovered the famous sendmail DEBUG hole in our Internet gateway machine, attempted to obtain copy of password file. I sent him one. For several months we led this cracker on merry chase order trace his location and learn techniques. This paper is chronicle cracker’s “successes” disappointments, bait traps used lure detect him, chroot “Jail” built watch activities. We concluded that lot time persistence, good list security holes use once obtained login machine. With these could often subvert uucp bin accounts short order, then root. Our was interested military targets new machines help launder connections.