Changes in Intrusion Profile
When CERT/CC first started
- exploiting passwords
- exploiting known vulnerabilities
Today
- exploiting passwords
- exploiting known vulnerabilities
- exploiting protocol flaws
- examining source files for new security flaws
- using ICMP attacks
- abusing anonymous FTP
- installing sniffer programs
- IP source address spoofing