Improving the Security of Your Site by Breaking Into it

PDF Document

It appears your Web browser is not configured to display PDF files. Download adobe Acrobat or click here to download the PDF file.

License

All rights reserved.

Contributed date

May 17, 2022 - 12:37pm

Critical Commentary

"In this paper we will take an unusual approach to system security. Instead of merely saying that something is a problem, we will look through the eyes of a potential intruder, and show why it is one. We will illustrate that even seemingly harmless network services can become valuable tools in the search for weak points of a system, even when these services are operating exactly as they are intended to."