Attacks and. Vulnerabilities. Ilya Chalyt Nicholas Egebo. March 7 2005. Topics of Discussion. Reconnaissance Gain information about a system Vulnerabilities Attributes of a system that can be maliciously exploited Attacks Procedures to exploit vulnerabilities. Reference 1.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
March 7 2005
Gain information about a system
Attributes of a system that can be maliciously exploited
Procedures to exploit vulnerabilities
Trying all entries in a collection of strings adding numbers and symbols concatenating them with each other and or numbers
Gain access to system, faster than brute force, more likely than just dictionary attack
Frequent attempts to authenticate
Lockouts – temporary and permanentPassword Cracks: Hybrid Attack