Responses to the following > > Can anyone help me finding a list and details of Intrusion and >Attack Scenarios ? ------------------------------------------------------------------------------ From: Steve Shelby <sshelby@wichita.fn.net> Date: Thu, 30 May 1996 15:50:48 -0600 do a web search (altavista?) for SATAN. Dan Farmer and... ah I forget the spelling of the other guys name.. Weitse.. something.. wrote a paper on some attach methods.. If you can't get what you need from that tell me and I'll research it futher.. I've got the paper on another machine ------------------------------------------------------------------------------ From: N D Ghaznavi <ndg@Ghaznavi.com> Date: Wed, 29 May 1996 14:51:57 -0400 (EDT) Check out CERT's ftp resources: http://www.sei.cmu.edu/SEI/programs/cert/CERT.info.html ------------------------------------------------------------------------------ From: Jerry Dixon <jdixon@ccpl.carr.lib.md.us> Date: Wed, 29 May 1996 14:02:25 -0400 (EDT) Get "Firewalls and Internet Security" by Cheswick & Bellovin.... Makes for real good reading and an excellent reference to have. +---------------------+--------------------------------------------------+ | ____ ___ | Justin Lister ruf@cs.uow.edu.au | | | \\ /\ __\ | Center for Computer Security Research | | | |) / \_/ / |_ | Dept. Computer Science voice: 61-42-214-327| | | _ \\ /| _/ | University of Wollongong fax: 61-42-214-329| | |_/ \/ \_/ |_| (tm) | LiNuX- iNTEL justification. mobile: 61-0412139269| | | Computer Security a utopian dream... | +---------------------+--------------------------------------------------+