Начать. Это бесплатно
или регистрация c помощью Вашего email-адреса
CHAPTER 4 SYSTEM HACKING создатель Mind Map: CHAPTER 4  SYSTEM HACKING

1. PRIVILEGE ESCALATION

1.1. - tactic use to gain unauthorized access

1.2. -horizontal and vertical

2. ROOTKIT COUNTERMEASURE

2.1. -relatively easy for virus writers

2.2. - use separate account

2.3. - run anti-spyware to block suspicious installation activities

3. HIDING FILES PURPOSE AND THE TECHNIQUES

3.1. - use NTFS to hide file

4. BUFFER OVERFLOW ATTACK

4.1. - buff

5. PASSWORD CRACKING TECHNIQUES

5.1. RULES OF PASSWORD -password is designed to be something an individual can remember easily but at the same time not something that can be easily guessed or broken -example of weak password 1.use only numbers 2.use only letters 3.use proper name 4.short password

6. TYPE OF PASSWORD ATTACKS

6.1. PASSIVE ONLINE ATTACK -attacker tends to be not engaged or less engaged than they would be during other kinds of attacks.

6.2. ACTIVE ONLINE ATTACK -use a more aggressive form of penetration that is designed to recover passwords.

6.3. OFFLINE ATTACKS -represent yet another form of attack that is very effective and difficult to detect in many cases.

6.4. DEFAULT PASSWORD -Set by the manufacturer when the device or system is built. -They are documented and provided to the final consumer of the product and are intended to be changed.

6.5. GUESSING PASSWORD -locate a valid user. -determine a list of potential password.

7. STEGANOGRAPHY TECHNOLOGIES

7.1. - use to conceal information inside of other information.