First page Back Continue Last page Summary Graphics
Response | Assessments contd
External contd
- Target vulnerabilities
- Banner analysis... server response to port scans
- Use DB of techniques
- Use search engines at hacker sites like RootShell
- Exploit
- Automatic attack tools
- Man-in-the-middle attacks
- Secondary exploitation... penetrate one machine, launch new attacks from it