First page Back Continue Last page Summary Graphics
Exploitation
Gaining access
- Password eavesdropping
- Buffer overflows
- Application vulnerabilities
Escalating privilege (gaining root/admin)
- Password cracking
- Network sniffing
- Application vulnerabilities