*
Gaining Access refers to the true attack phase. The hacker exploits the system.
*
The exploit can occur over a LAN, locally, Internet, offline, as a deception or theft. Examples include stack-based buffer overflows, denial of service, session hijacking, password filtering etc.
*
Influencing factors include architecture and configuration of target system, skill level of the perpetrator and initial level of access obtained.
*
Business Risk - 'Highest' - The hacker can gain access at operating system level, application level or network level.
Saturday, 26 February 2011
// //
0
comments
//
0 comments to "Hacking Phase 3 - Gaining Access - The hacker exploits the system"
Total Pageviews
Blog Archive
-
▼
2011
(43)
-
▼
February
(28)
-
▼
Feb 26
(19)
- Anonymizers- Make your web surfing anonymous
- What is Proxy?
- Cheops-Network management tool-equivalent of a Swi...
- Passive Fingerprinting
- Active Stack Fingerprinting: This technique is cal...
- Tool: Super Scan - Port scanner
- Tool: Net Scan Tools Pro
- Ethical Hacker and Scanning Tools
- What is Nslookup?
- Footprinting - Attack Methods
- What is Footprinting?
- Hacker Classes - Black hats, White Hats, Gray Hats,
- Hacking Phase 5 - Covering Tracks
- Hacking Phase 4 - Maintaining Access
- Hacking Phase 3 - Gaining Access - The hacker expl...
- Hacking Phase 2 - Scanning
- Hacking Phase 1 - Reconnaissance
- Hacktivism
- What do Ethical Hackers do?
-
▼
Feb 26
(19)
-
▼
February
(28)



Post a Comment