NATS 1505 Lecture Notes - Lecture 11: Skill, Port Scanner, Nmap

26 views2 pages

Document Summary

Vulnerability exploitation: exploiting vulnerabilities is another common method of infiltration, attackers will scan computers to gain information about them, below is a common method for exploiting vulnerabilities: Step 1: gather information about the target system, this could be done in many different ways such as a port scanner or social engineering, the goal is to learn as much as possible about the target computer. Step 2: one of the pieces of relevant information learned in step 1 might be the operating system, its version, and a list of services running on it. Step 3: when the target"s operating system and version is known, the attacker looks for any known vulnerabilities specific to that version of os or other os services. Step 4: when a vulnerability is found, the attacker looks for a previously written exploit to use. If no exploits have been written, the attacker may consider writing an exploit.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents