NATS 1505 Lecture Notes - Lecture 11: Skill, Port Scanner, Nmap
Document Summary
Vulnerability exploitation: exploiting vulnerabilities is another common method of infiltration, attackers will scan computers to gain information about them, below is a common method for exploiting vulnerabilities: Step 1: gather information about the target system, this could be done in many different ways such as a port scanner or social engineering, the goal is to learn as much as possible about the target computer. Step 2: one of the pieces of relevant information learned in step 1 might be the operating system, its version, and a list of services running on it. Step 3: when the target"s operating system and version is known, the attacker looks for any known vulnerabilities specific to that version of os or other os services. Step 4: when a vulnerability is found, the attacker looks for a previously written exploit to use. If no exploits have been written, the attacker may consider writing an exploit.