Skip to main content

Basic Offense

  • Chapter
  • First Online:
Cyber Operations
  • 2564 Accesses

Abstract

How does an adversary attack a computer system? One approach is to provide data to a program running on that system that causes it to act on behalf of the attacker. The Morris worm, released in 1988, attacked vulnerable services including fingerd and sendmail, as well as poorly configured rexec and rsh. When it attacked fingerd, it sent a 536-byte request to C code using gets() that provided a buffer with only 512 bytes of space; the resulting overflow allowed the worm's code to execute on the target.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.nytimes.com/1990/05/05/us/computer-intruder-is-put-on-probation-and-fined-10000.html

  2. 2.

    https://www.justice.gov/archive/usao/ma/news/2011/July/SwartzAaronPR.html

  3. 3.

    http://www.nytimes.com/2013/01/13/technology/aaron-swartz-internet-activist-dies-at-26.html

  4. 4.

    These may need to be repeated if the software on the Kali system is updated.

  5. 5.

    Yes, this is the same name as the previous module.

  6. 6.

    Metasploit 5 was released in January 2019, and has changed the flags used by the generate function.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Mike O'Leary

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

O’Leary, M. (2019). Basic Offense. In: Cyber Operations. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4294-0_2

Download citation

Publish with us

Policies and ethics