O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How Hackers Exploit TCP/IP

Because hackers are constantly scanning IP addresses on the Internet, you could have a system hacked within a matter of minutes of connecting to the Internet. Before you consider installing a server to the Internet, you must secure the services and apply the latest patches and service packs. If a hacker happens to see your newly built server on the Internet, he will try to leverage a laundry list of exploits, scripts, and prebuilt intrusion utilities against it in hopes of finding a hole. Unless you have spent time securing and patching the server, the hacker will likely penetrate your server in short order.

Other possibilities include substituting fake packets of information for others or executing attacks, such as ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required