Chapter 2. How Hackers Attack
It is crucial that Windows security defenders understand how malicious hackers can attack and exploit their systems. Only when attacks are thoroughly understood can sufficient defenses be designed and implemented. Thus, this chapter focuses on the major methods of malicious exploitation.
Malicious Exploitation
Microsoft Windows is the most attacked PC desktop OS in the world, coming under attack from both dedicated hackers and automated malicious software. Regardless of whether the attack is occurring as a results of skilled human hands or pre-programmed malware, both methods use one of eight techniques to exploit a computer.
Eight Exploitation Techniques
The eight exploitation techniques are:
Logon credential guessing/cracking
Buffer overflow
OS or application vulnerability
OS or application misconfiguration
Eavesdropping/man-in-the-middle attack
Denial of service attack
Client-side attack
Social engineering
There are many different types of attacks, but these are the major ones. The next section of the chapter covers each of the techniques in more detail.
Logon Credential Guessing/Cracking
Logon credential password guessing and cracking are among a hacker's (or worm's) favorite attacks. Many sources call this technique "password cracking," but that name is an oversimplification of the subject. First, users don't always use passwords in their logon sequence. They can use passphrases, biometrics, smart cards, fingerprint scanning, digital certificate, or some other ...
Get WINDOWS VISTA™ SECURITY: Securing Vista Against Malicious Attacks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.