Chapter 5. Classes of Attacks

Thus far, we have discussed a number of techniques for attacking systems. Many of these share common characteristics. It is worthwhile categorizing them; the patterns that develop can suggest where protections need to be tightened.

Stealing Passwords

 

Stealing Passwords

“What does it mean by speak, friend, and enter?” asked Merry.

“That is plain enough,” said Gimli. “If you are a friend, speak the password, and the doors will open, and you can enter.”

. . .

“But do not you know the word, Gandalf?” asked Boromir in surprise.

“No!” said the wizard. . . . “I do not know the word—yet. But we shall soon see.”

Lord of the Rings

 
 --J.R.R. TOLKIEN ...

Get Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.