-
June 11th, 2007, 02:32 AM
#11
And that really is the point, and the most difficult thing for us to ascertain here. Is the question really a security question, or a hacking question masquerading as one?
I think what really pisses people off is that the more people say words like hack or hacker, the less people talk about computers. And the fact of the matter is that right now you, me, and even the administrator of this site are just taking things one extra step downward.
Um... hah!
Last edited by rlt; June 11th, 2007 at 02:58 AM.
-
June 11th, 2007, 09:42 AM
#12
Originally Posted by VeerGiant
since it is such a large field i'm having trouble finding appropriate resources.
This will keep you occupied for a while:
SANS: Reading Room
Oliver's Law:
Experience is something you don't get until just after you need it.
-
June 11th, 2007, 04:03 PM
#13
Meh...
I've seen two useful responses to his question.
Oh yeah...
And that really is the point, and the most difficult thing for us to ascertain here. Is the question really a security question, or a hacking question masquerading as one?
Quit bitching. Nobody really cares.
Real security doesn't come with an installer.
-
June 11th, 2007, 05:25 PM
#14
Frankly, I don't care whether you do or not. It doesn't concern you.
-
June 11th, 2007, 05:49 PM
#15
Junior Member
Hey rtl.........actually i'm working on linux, so should i know the complete details of socket.h instead of winsock
and thnx SirDice that site is proving to be quite informative
-
June 12th, 2007, 06:06 AM
#16
VeerGiant,
It would help if you gave us the precise instructions you have been given.
In particular, I would like to know what the deliverable is supposed to be. Is it a presentation? a 15,000~25,000 word dissertation or whatever?
I am afraid that you might be falling into the trap of going for the detail too early on. You really need to create a top level plan of action first
Professors will not usually ask you to do something that has not already been covered in a course.
Nobody ever bothered to tell my lot that! Actually, a part of your university education is being able to demonstrate the capacity to conduct independent research in an area you have not been spoon fed.
As you noted in your first post, this is a huge subject area, so your problem is going to be one of selection. Incidentally, what is your deadline?
To restrict this project to manageable proportions you are going to have to carefully define your scope, and you need to do this first.
EDIT: I really don't see how this can be taken as anything other than a request for mentoring/advice regarding an academic project.
If I wanted to do anything malicious I would need to know:
1. Hardware platform(s)
2. Operating System(s)
3. Applications
4. Network Architecture
5. Access Vectors
Absolutely none of those have been mentioned
Last edited by nihil; June 12th, 2007 at 07:34 AM.
-
June 12th, 2007, 03:40 PM
#17
As far as things you can demonstrate without using any special software you should show your teacher XSS and SQL Injections.
http://en.wikipedia.org/wiki/Cross-site_scripting
http://en.wikipedia.org/wiki/SQL_injection
-
June 12th, 2007, 05:22 PM
#18
Junior Member
Well maybe i've not explained my problem clearly.
I have just completed my 2nd year in BTech and i approached my prof for a project related to network security. Since both the networking and OS courses are in the next semester, my prof told me that he would not be able to give me a specific task in security but for these holidays told me to study the various types of attacks and try to implement some of them, and implementation of this knowledge will be done in the winter vacations after the next semester when he would give me a specific security related task.
So for the time being i am trying to categorize all the attacks, and learning raw socket programming.
I hope this clears things out.
Similar Threads
-
By qod in forum The Security Tutorials Forum
Replies: 6
Last Post: February 27th, 2004, 03:03 AM
-
By gore in forum Newbie Security Questions
Replies: 11
Last Post: December 29th, 2003, 08:01 AM
-
By NullDevice in forum The Security Tutorials Forum
Replies: 21
Last Post: December 17th, 2003, 10:03 PM
-
By -DaRK-RaiDeR- in forum AntiOnline's General Chit Chat
Replies: 13
Last Post: January 10th, 2003, 07:10 PM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|