The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.10 - October (2007 vol.8)
pp: 2
Sergey Bratus , Dartmouth College
ABSTRACT
This two-part article discusses the factors distinguishing the hacker culture from the IT industry and traditional academia, using networking examples. This first part describes the starting points of the hackers' approach to layered computer systems.
INDEX TERMS
hacking, black hat, white hat, gray hat
CITATION
Sergey Bratus, "Hacker Curriculum : How Hackers Learn Networking", IEEE Distributed Systems Online, vol.8, no. 10, pp. 2, October 2007, doi:10.1109/MDSO.2007.58
REFERENCES
1. G. Conti,"Why Computer Scientists Should Attend Hacker Conferences," Comm. ACM, vol. 48, no. 3, 2005, http://www.rumint.org/gregconti/publications 20050301_CACM_HackingConferences_Conti.pdf pp. 23—24;
2. S. Bratus,"What Hackers Learn That the Rest of Us Don't: Notes on Hacker Curriculum," IEEE Security and Privacy vol. 5, no. 4, 2007, pp. 72—75.
3. "(Nearly) Complete Linux Loadable Kernel Modules," Mar. 1999; http://packetstormsecurity.org/docs/hack LKM_HACKING.html.
4. S. Cesare,"Runtime Kernel Kmem Patching," VX Heavens, Nov. 1998; http://vx.netlux.org/libvsc07.html.
5. M. Handley,V. Paxson,, and C. Kreibich,"Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics," Feb. 1998; http://www.icir.org/vern/papersnorm-usenix-sec-01-html .
6. O. Arkin,"ICMP Usage in Scanning: The Complete Know-How," ver. 3, June 2001; http://www.sys-security.com/archive/papers ICMP_Usage_v3.0.pdf.
7. N. Provos,"A Virtual Honeypot Framework," Proc. 13th Conf. Usenix Security Symp. Usenix, 2004; http://www.usenix.org/publications/library/ proceedings/sec04/tech/full_papers/provos provos.pdf
8. K. Wang,"Frustrating OS Fingerprinting with Morph," presentation at DefCon 12, 2004; http://www.defcon.org/images/defcon-12/dc-12-presentations/ Wangdc-12-wang.pdf
9. J. Ellch,"802.11 VLANs and Association Redirection," Uninformed vol. 2, Sept. 2005; http://uninformed.org?v=2&a=3&t=pdf .
10. J. Cache,"Fingerprinting 802.11 Implementations via Statistical Analysis of the Duration Field," Uninformed vol. 5, Sept. 2006; http://uninformed.org?v=5&a=1
11. J. Cache and D. Maynor,"Hijacking a MacBook in 60 Seconds or Less," video, Washington Post2 Aug. 2006; http://www.washingtonpost.com/wp-dyn/content/ video/2006/08/02VI2006080201424.html .
12. T.H. Ptacek and T.N. Newsham,Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , tech. report, Secure Networks, Jan. 1998.
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool