Chapter 5. Classes of Attacks
Thus far, we have discussed a number of techniques for attacking systems. Many of these share common characteristics. It is worthwhile categorizing them; the patterns that develop can suggest where protections need to be tightened.
Stealing Passwords
“What does it mean by speak, friend, and enter?” asked Merry. “That is plain enough,” said Gimli. “If you are a friend, speak the password, and the doors will open, and you can enter.” . . . “But do not you know the word, Gandalf?” asked Boromir in surprise. “No!” said the wizard. . . . “I do not know the word—yet. But we shall soon see.” Lord of the Rings | ||
--J.R.R. TOLKIEN ... |
Get Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.