2. Retrieve information, modify network behavior
The intruder has now established a precise list of the various operating systems present on a network, using the techniques presented in paragraph 1 . The intruder is now keen to determine which systems to focus on.
Unfortunately for him, many systems are protected by security mechanisms, and he needs to get an idea of how important a system is without succeeding in an intrusion. on each of them, as this would take too long...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Retrieve information, modify network behavior
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Requests For Comments
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!