Network Security (7)
Typical scenario:
- gain access to an account
- exploit a vulnerabilities in an operating systems (Unix services are particularly vulnerable (sendmail, NFS, NIS, DNS, FTP, TFTP, SYSLOG)
- use "crack" to break more user passwords
- obtain superuser privileges
- install "back doors" (Trojan Horses)
- install sniffers (packet and password grabbers) to obtain more password and site information