February 15, 2011

Attack Types and Vulnerabilities

Introduction

There exist numerous ways to attack a target system. It could be achieved by exploiting known vulnerabilities in software or taking advantage of a badly configured security policy; it could be implemented remotely or internally. The techniques and methods used are likely to vary depending on the target and they should be chosen appropriately having assessed the situation fully. The attack types and vulnerabilities discussed in this module, are:

• Buffer Overflow attacks.

• Denial of Service (DoS) attacks.

• Misconfigurations.

• Abuse of Trust.

• Brute force attacks.

• CGI and WWW services.

• Back doors and Trojans.
 

Who The Hackers Are ?


The hackers are just like us. Made of same flesh and bones but think differently. What normal people cannot think even in their dreams, hackers can do that in reality.

The hackers possess higher degree of attitude and fortitude. Whatever they do is for humanity. They are responsible for the modern day technology and they have developed the techniques to cop with future problems. They are responsible for creating and updating the top security systems. Think about it, if hackers will be absent from our society, then, our society will be totally unable to secure the country and will be considered as a dull society.