Chapter 16. An Evening with Berferd
Getting hacked is seldom a pleasant experience. It’s no fun to learn that undetectable portions of your host have been invaded and that the system has several new volunteer system administrators.
In our case, a solid and reliable gateway provided a reassuring backdrop for managing a hacker. Bill Cheswick, Steve Bellovin, Diana D’Angelo, and Paul Glick toyed with a volunteer. Cheswick relates the story.
Most of this chapter is a reprint of [Cheswick, 1992]. We’ve used this font to insert a bit of wisdom we learned later. Hindsight is a wonderful thing.
As in all hacker stories, we look at the logs. . .
Unfriendly Acts
I first noticed our volunteer when he made a typical request through an old and deprecated route. ...
Get Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.