The Quest for Root

Vulnerability Mapping

Methods of Vulnerability Mapping

Remote Access

Local Access

Remote Access

ATTACKS and Countermeasures

Brute-force Attacks

Brute-force Countermeasures

Buffer Overflow Attacks

Back to Cptr427Winter2010