An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied

作者: Bill Cheswick

DOI:

关键词:

摘要: On 7 January 1991 a cracker, believing he had discovered the famous sendmail DEBUG hole in our Internet gateway machine, attempted to obtain copy of password file. I sent him one. For several months we led this cracker on merry chase order trace his location and learn techniques. This paper is chronicle cracker’s “successes” disappointments, bait traps used lure detect him, chroot “Jail” built watch activities. We concluded that lot time persistence, good list security holes use once obtained login machine. With these could often subvert uucp bin accounts short order, then root. Our was interested military targets new machines help launder connections.

参考文章(3)
Bill Cheswick, The Design of a Secure Internet Gateway. USENIX Summer. pp. 233- 238 ,(1990)
Clifford Stoll, John W. D. Connolly, The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Physics Today. ,vol. 43, pp. 75- 76 ,(1990) , 10.1063/1.2810663