January 21, 2004

real hacking

In my intrusion detection class we learned about Mitnick's attack. We've been mostly focusing on detecting covert channels and signs of attacks, not how you would implement the attacks. But the discussion of the SYN flood made me realize I think I know enough of the method and the few names of tools mentioned would give me the implementation to do it myself. So me and a few friends are planning on getting on a local network and seeing who can take down each other's computer first. Or who can take down a dummy box first. Of course none of us really know much about hacking, so we're going to agree on a set of tools first, because otherwise a difference in tools would quite likely make the difference.

Posted by Dave at January 21, 2004 07:19 PM | TrackBack
Comments

I can see it now, ACM sponsored competitions to crack a box in the name of learning about security ;-)

Good luck! Don't get addicted.

Posted by: Brian McCallister at January 21, 2004 08:37 PM