O'Reilly logo

Windows Forensics and Incident Recovery by Harlan Carvey

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Attacks Are Easy

One major issue having to do with all incidents is the ease with which they can be executed. As we've discussed throughout this chapter so far, from the Linux bootdisk to the AppleTree auto-rooter, the tools for perpetrating incidents are widely available. Many of these tools require little more than a click of a button in order to launch an attack on one system or one hundred systems. In addition, more vulnerabilities are being made publicly available right along with tools that can be used to exploit them.

Discovering and exploiting vulnerabilities to software systems used to be the purview of experienced programmers. As time has progressed, and more and more people have obtained access to computers and the Internet, the knowledge ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required