The Quest for Root

Vulnerability Mapping

Methods of Vulnerability Mapping

Remote Access

Local Access

Remote Access

ATTACKS and Countermeasures

Brute-force Attacks

Brute-force Countermeasures

Buffer Overflow Attacks

Quiz

1. In what year was Unix project started? 1969

2. What is the name of the parent system that Unix came out of? === MULTICS ===

3. List 2 of the 4 Remote access categories.

4. What is the best Countermeasure for a brute force attacks? Strong Passwords

5. Other than disabling unused services to mitigate buffer overflow attacks, what else should you disable? Dangerous services

Back to Cptr427Winter2010