Tool box
System attacks - Take control of the stronghold
Article REF: H5833 V1
Tool box
System attacks - Take control of the stronghold

Author : Laurent LEVIER

Publication date: April 10, 2006 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

2. Tool box

We now know the theory behind attack techniques that capitalize on weaknesses, whatever they may be. But in concrete terms, how does a malicious person go about creating his or her work? It may seem complex at first glance, but in reality, the popularization of tools and their organization in packages has made them easier to implement. This has led to the emergence of a new breed of totally inexperienced hackers, the script kiddies, who see an opportunity to break the law without risk (they believe) by attacking machines on the Internet from their xDSL or modem access.

By way of example, here is a list of a few tools, some of which were used in the files dealing with the attacks , but also knowledge bases that can be used to quickly identify vulnerabilities in specific products, network services or operating systems.

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details