Lesson 10 | Identifying suspicious activity |
Objective | Describe the various types of activities and attacks to which an Internet server is vulnerable. |
http://www.sysinternals.com/Utilities/Handle.html.
C:\> handle filename
Suspicious Activity | Possible Cause |
Multiple login failures | An unauthorized user may be trying to gain access, using various User ID/Password combinations |
Denail of service | 1. Server or router may be down. 2. Email bombing, in which s user's email address is flooded with so much that the mail server is overloaded 3.Worms, programs, or viruses that use network connections to infect other systems 4. A Trojan horse, which is a seemingly harmless software that conceals its true purpose, which is to evade access control of authentication |
Mail flooding and spam | Multiple user mailboxes are flooded with mail including spam, unsolicited junk e-mail, posting, new articles, and advertising |
PING flood | PING is used to test the integrity and responsiveness of a network. The "Ping of Death" occurs when a large packet of data ( for example 1MB) is sent, causing the TCP/IP stack to cease functioning correctly |
SYN flood | Occcurs when TCP sends a connection request (SYN) and the source IP address is replaced with an address not in use on the internet or an address belonging to another client. |