攻防演練課程內(nèi)容

2019-03-25 11:26

Methods of attack:
1. scanning may include us≠ >&ing search (google) as well as m•¥'ore traditional methods (nmap)
2. social engineering
3. shooting yourself in the foot


One methodology of the attackers
1. surveillance
2. finding ip dst addresses
3. find KNOWN bugs (known to them)
4. exploitation post break-in
5. hiding their tracks post Or pre bre$σak-in


Implement attack
1. backdoor
2. social engineering attack→₽ ε
3. buffer overflow
4. dictionary attack
5. oh wait, we have the Morris wormφ'•  for those terms
6. password attacks
7. fanout attacks included
8. VAX buffer attack code