exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ankle-biters.html

ankle-biters.html
Posted Aug 17, 1999

IDS Terminology

systems | unix
SHA-256 | bfbb46927b0b80929eaeb2b2c11deda912d04f3d056e2c44b3ff80973869c203

ankle-biters.html

Change Mirror Download
<HTML><HEAD>

<TITLE>Terminology</TITLE>

</HEAD>

<body text="#000000" bgcolor="#FFFFFF" link="#191970" vlink="#551A8A" alink="#FE0000">



<h1>Terminology</h1>
<br>
<br>
This is a list of some basic terminology you may find me using from
time to time. It short right now, but I'll add more as I get the time.&nbsp;
<BR>&nbsp;
<BR>&nbsp;

<P><A NAME="anklebiter"></A><B>Ankle
Biter </B>- This is a term used to describe relatively new hackers, or
expericenced hackers who <A HREF="#justdontgetit">"Just don't get it."</A>
They are somewhat successful in their hacking exploits simply because most
site security is so pathetic. They are also referred to as <A HREF="#scriptkiddies">Script
Kiddies</A>.&nbsp;

<P><A NAME="bohica"></A><B>BOHICA</B>
- An acronym that is short for: Bend Over Here It Comes Again. This generally
refers to some situation or circumstance that results in your taking it
up the ass. For system security there are a few system daemons that I consider
instant BOHICA material, not because they are any worse than any other
service (well the R-services do just plain suck), but because they tend
to almost always be setup incorrectly or are inherently flawed:&nbsp;
<CENTER>R*-Services (RSH, Rlogin)</CENTER>

<CENTER>Rexd</CENTER>

<CENTER>NFS</CENTER>

<CENTER>TFTP</CENTER>

<CENTER>Finger</CENTER>

<CENTER>NIS</CENTER>

<CENTER>X-Windows</CENTER>
&nbsp;

<P><A NAME="bogahica"></A><B>BOGAHICA</B>
- From the root <A HREF="#BOHICA">BOHICA</A>, this is an acronym that is
short for: Bend Over, Grab Ankles, Here It Comes Again. This his a saved
for that heightened sense of knowing you are about to get screwed really
badly. This word can be used interchangably with BOHICA, but proper form
is to save it for the more serious situations.&nbsp;

<P><A NAME="justdontgetit"></A><B>"Just
Don't Get It."</B> - A favorite term of mine that a friend of mine often
used to describe people who, well, Just Don't Get It. This can apply to
any number/types of people you run across in everyday life. For computer
security professionals though, this is a hacker who repeatedly tries and
fails to hack your network or, after having been discovered and kicked
off, makes repeated attempts to gain re-entry and risk getting caught.&nbsp;

<P>An example of a person who "Just Don't Get It" is a system I set up
once to lure hackers into trying out their <A HREF="http://www.psionic.com/papers/attacks">IMAP</A>
exploits so I could see what they were doing. After having gotten the information
I needed I put up a simple banner that would display "THIS PORT IS A TRIPWIRE.
YOU ARE BEING WATCHED -- GO AWAY" anytime someone connected to the port.
Much to my chagrin, I still had several people <B>repeatedly</B> try their
exploits against the host and have them fail. They finally got the clue
when I shut off the service altogether, but it wasn't for a lack of trying
on my part I assure you.&nbsp;

<P><A NAME="scriptkiddies"></A><B>Script
Kiddies</B> - Hackers who run code and exploits that other people have
written to gain access to hosts. They are often beginners and don't even
know what the exploit does or what protocol flaws are being attacked. They
are closely related to <A HREF="#anklebiter">ankle biters</A>.&nbsp;


<P>
<br>
<br>
<br>
<br>
<br>
<!-- standard disclaimer -->
<CENTER>
<HR width="50%" size=1><B><I><NOBR><FONT SIZE=-1>All Material <A HREF="http://www.psionic.com/misc/disclaim">Copyright</A>
&copy;1996-99 Craig H. Rowland and Psionic Software Systems</FONT></NOBR></I></B></CENTER>

<CENTER><NOBR><FONT SIZE=-1><A HREF="http://www.psionic.com/misc/contact">Contact
Me</A>
<br>
Site last updated: 1999/03/24</FONT></NOBR></CENTER>

</BODY>


</BODY>
</HTML>

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close