Mailinglist Archive


Examining a Public Exploit, Part 1
From:Joe Klemmer
Date: Sat, 14 Aug 2004 10:23:36 -0400

Examining a Public Exploit, Part 1
by Don Parker
last updated August 11, 2004 

To many people, the world of computer security and intrusion detection
can often be confusing to understand. As an instructor, many of the
people who ask me about intrusion detection and packet analysis often
ask the same questions, such as the following: What tools do you use?
Can you practice and learn this at home? What kind of knowledge does one
need to have? These and other questions figure predominantly.

In this article series these questions will be answered and shown to the
reader for evaluation in a lab environment.

http://www.securityfocus.com/infocus/1795