The Motives and Psychology of the Black-hat Community
Source: SecurityFocus - Posted by Dave Wreski   
Intrusion Detection This paper is a continuation of the Know Your Enemy series. This series is dedicated to learning the tools and tactics of the black-hat community. Unlike the previous papers which focused purely on the "what" and "how" of the black-hat community, . . . This paper is a continuation of the Know Your Enemy series. This series is dedicated to learning the tools and tactics of the black-hat community. Unlike the previous papers which focused purely on the "what" and "how" of the black-hat community, specifically the technical tools, their use and implementation, this paper explores the motivation and psychology of the black-hat community, in their very own words. Part I starts with the compromise of a Solaris 2.6 system. Part II provides information rarely published, a record of conversations and actions which took place over a fourteen-day period following the compromise of a honeypot system. Learn how and why black-hats attack systems.

Read this full article at SecurityFocus

Comments
MgrWritten by Rakesh on 2006-04-21 02:01:38
Please keep the topic of messages relevant to the subject of the article

Only registered users can write comments.
Please login or register.

Powered by AkoComment!