1 |
Typical scenario:
-
gain access to an account
-
exploit a vulnerabilities in an operating systems (Unix services are particularly vulnerable (sendmail, NFS, NIS, DNS, FTP, TFTP, SYSLOG)
-
use "crack" to break more user passwords
-
obtain superuser privileges
-
install "back doors" (Trojan Horses)
-
install sniffers (packet and password grabbers) to obtain more password and site information
|