Impersonating a User or System



next up previous contents
Next: Eavesdropping Up: Generic Description of Previous: Generic Description of

Impersonating a User or System

As described in section 6.1, common ways to identify and authenticate users include the use of physical keys, account names and passwords, and biometric checks. Password guessing, password trapping, use of security holes in programs, and use of common network access procedures are methods that can be used to impersonate users. Impersonation attacks involving the use of physical keys and biometric checks are less likely.

Compared to standalone systems, systems on networks are much more susceptible to attacks where crackers impersonate legitimate users for the following reasons:

Individual systems on a network are also vulnerable to imposter attacks. A cracker can configure a system to masquerade as another system, thus gaining unauthorized access to resources or information on systems that ``trust'' the system being mimicked. section 10.2.7 discusses how to protect a system against impersonation when using the ``r'' commands.



next up previous contents
Next: Eavesdropping Up: Generic Description of Previous: Generic Description of



John Barkley
Fri Oct 7 16:17:21 EDT 1994