The Quest for Root

Vulnerability Mapping

Methods of Vulnerability Mapping

Remote Access

Local Access

Remote Access

ATTACKS and Countermeasures

Brute-force Attacks

Brute-force Countermeasures

Buffer Overflow Attacks

Quiz

1. In what year was Unix project started? 1969

2. What is the name of the parent system that Unix came out of? MULTICS

3. List 2 of the 4 Remote access categories.

4. What is the best Countermeasure for a brute force attacks? Strong Passwords

5. Other than disabling unused services to mitigate buffer overflow attacks, what else should you disable? Dangerous services

Security Pres

Back to Cptr427Winter2010

HackingExposedChapter05 (last edited 2010-03-11 13:44:19 by c-68-53-233-3)