The Quest for Root

Vulnerability Mapping

Methods of Vulnerability Mapping

Remote Access

Local Access

Remote Access

ATTACKS and Countermeasures

Brute-force Attacks

Brute-force Countermeasures

Buffer Overflow Attacks

Quiz

1. In what year was Unix project started? === 1969 === 2. What is the name of the parent system that Unix came out of? === MULTICS === 3. List 2 of the 4 Remote access categories.

4. What is the best Countermeasure for a brute force attacks? Strong Passwords 5. Other than disabling unused services to mitigate buffer overflow attacks, what else should you disable? Dangerous services

Back to Cptr427Winter2010