Speak Asia Online Money Earning: SPEAK ASIA Online Income
Make Money Online & Earn Online Income @ RAM SURVEY
Add me as a friend on FACEBOOK: CLICK HERE to add me on FaceBook

Receive Daily Updates

Enter your email address:

Wednesday, April 6, 2011

Hacking Phase 3 - Gaining Access - The hacker exploits the system

Phase 3 - Gaining Access
  • Gaining Access refers to the true attack phase. The hacker exploits the system.

  • The exploit can occur over a LAN, locally, Internet, offline, as a deception or theft. Examples include stack-based buffer overflows, denial of service, session hijacking, password filtering etc.

  • Influencing factors include architecture and configuration of target system, skill level of the perpetrator and initial level of access obtained.

  • Business Risk - 'Highest' - The hacker can gain access at operating system level, application level or network level.

0 Visitor Reactions & Comments: