8 Phase 3: Gaining Access Using Network Attacks

As we have seen, attackers have devised some powerful techniques for gaining access by breaking applications and operating systems. Now we turn our attention to techniques for gaining access through network-based attacks. As our computing infrastructures have grown more network-centric and much of our lives revolve around networked computers, attackers have devised very clever means for undermining computer communications. As we wind our way through the scenarios in this chapter, it is important to remember that these network-based attacks will work no matter if our networks are made up of wires, switches, and hubs or if they consist of radio waves and wireless access points. In fact, as wireless ...

Get Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.