Recent Posts

Presentation on Computer System Attack Classification

An attacker always want intrusion. He depends on some techniques or methods.
A successful intrusion have some important object. Like
> Fix a object and scan for its vulnerability and fix a subject to explore.
> Exchange information between object and subject(user).
> Change inject point after failing push payload.
> Failing for explore payload can make vulnerable of the system.
> Always want to get root privilege.

Post a Comment