Professional Documents
Culture Documents
Os Attack 82102
Os Attack 82102
PASSIVE : NO MODIFICATION
ACTIVE : CAN BE MODIFIED.
OS ATTACKS:
1) GAINING ACCESS ATTACK
2) MISCONFIGURATION ATTACK
3) APPLICATION LEVEL ATTACK
===============================================
OS LEVEL ATTACK :
====================
Application level attack :
SQL INJECTION
PHISHING
CROSS- SITE- SCRIPTING
SESSON HIJACKING
DENIAL OF SERVICE ATTACK
SESSION HIJACKING
==================
Misconfiguration attack:
===================================================
1) Computer security: to protect the computer system and the data which is stored
in the system.
2) Cyber security: It is a process of protecting data, system nd networks against
cyber attack.
3) Information security : It is a process to protect information and information
system from threats
through security control to reach C.I.A.
4) cyber forensics: extracting dat as a proof for crime.
recovery process of deleted files. emails. audio videos.
5) Public network: accessible for all users across the globe. It is used by anyone.
unsecured.
6) Private network: It is a private because it follows non routable network. for
private organization. secured.
=======================
Metasploit: It is a ruby based penetration tesing platform to perform an exploit
code. making payloads.
Post exploitation process is also an improtant part.
It is used to dicovering vulnerabilities.
It is a framework.
paylod: carrying capacity of a packet