Sunday, 3 February 2013

Vulnerability Exploitation in Action Introduction


Vulnerability Exploitation in Action
Introduction

The previous modules have shown how to passively gather
information on a company, map potential target networks, identify the
software and services running on those networks’ hosts and identify
potential avenues for attack.
The theory behind the attack techniques has already been discussed in
the introduction to the course, and some functional examples of various
attack types on the customer target network will now be presented.
A real attack on a target network would be carried out over a longer
period of time, and probably with lower individual exploit success,
especially in more security aware companies. These examples are
designed to lead the student through multiple avenues of attack to
indicate the chaining concept often exhibited by attackers in the real
world.

No comments:

Post a Comment