2. Tool box
We now know the theory behind attack techniques that capitalize on weaknesses, whatever they may be. But in concrete terms, how does a malicious person go about creating his or her work? It may seem complex at first glance, but in reality, the popularization of tools and their organization in packages has made them easier to implement. This has led to the emergence of a new breed of totally inexperienced hackers, the script kiddies, who see an opportunity to break the law without risk (they believe) by attacking machines on the Internet from their xDSL or modem access.
By way of example, here is a list of a few tools, some of which were used in the files dealing with the attacks , but also knowledge bases that can be used to quickly identify vulnerabilities in specific products, network services or operating systems.
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Tool box
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Requests for Comments (RFC)
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!