8 Phase 3: Gaining Access Using Network Attacks
As we have seen, attackers have devised some powerful techniques for gaining access by breaking applications and operating systems. Now we turn our attention to techniques for gaining access through network-based attacks. As our computing infrastructures have grown more network-centric and much of our lives revolve around networked computers, attackers have devised very clever means for undermining computer communications. As we wind our way through the scenarios in this chapter, it is important to remember that these network-based attacks will work no matter if our networks are made up of wires, switches, and hubs or if they consist of radio waves and wireless access points. In fact, as wireless ...
Get Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.