Attack Analysis

I’ve always found analysis of attempts to hack systems extremely interesting. I’m not sure if this reflects some miscreant leaning on my part, but I’ve enjoyed these ever since I read Cuckoo’s Egg by Clifford Stoll years ago.

I’ve collected up a few links over the years to these types of articles, such as:

Well, I’ve just found Robert Hensing’s blog where he’s been regularly detailing new attacks his team uncovers.

Be the first to leave a comment. Don’t be shy.

Join the Discussion

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>