波音游戏-波音娱乐城赌球打不开

III. Vulnerabilities of Hacking Protection

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */  
 
 
Common Types of Attack
 

Vulnerability scanning

Hacker may initiate vulnerability scanning on target organisation's network to proactively identify the vulnerabilities of computer systems on a network. Hacker may obtain the operating system and version number, including service packs that may be installed, and identifies weaknesses or vulnerabilities in the operating system, on which certain hacking protection technologies are deployed.

Password cracking

Hacker may attempt to get password of an authorised user to gain access to the system with the username and password with authentication, which may render the hacking protections ineffective.

Trojans and backdoors

Trojans may sometimes be hidden in a software package of another program. Victims download the software package and install trojans onto their computer without notice. Once installed, trojans can run malicious programs on victim's computer, such as running commands remotely, intercepting keystrokes and so on. Backdoors created by Trojans also give hackers subsequent access to victims' computers.

Viruses and worms
The malicious codes from the hacker can be spread to victim's computer by a carrier programs, either via the form of viruses or worms. A virus code is infected on another normal program to spread itself. A worm is able to self-replicate and move from an infected computer to another victim's computer through network connection. If the hacking protection mechanisms are infected by viruses and worms, their abilities to defend against malicious attacks can be seriously impaired.

Recent Incident

HKEx Website Hacked

Trading in Hong Kong was disrupted on 10 August 2011 by a hacking incident on the Hong Kong Exchange website.

Shares of eight-listed companies were suspended from trade, including those of bourse operator Hong Kong Exchanges and Clearing, flag-carrier Cathay Pacific and banking giant HSBC.

Hong Kong Exchanges & Clearing CEO Charles Li said: "Our current assessment (is) that this is the result of a malicious attack by outside hacking.

Denial of Service
Denial of service (DoS) is initiated by hackers to prevent legitimate users of a system from using it by different methods, such as flooding a network with traffic and preventing a particular individual from accessing a service. If a denial of service attack is posed upon an intrusion detection system, it is possible that the intrusion detection system is suspended and further exploitations can be generated gainst the Universities' network.

Inadequate Code Review
Inadequate Code Reviews performed for application can result in system vulnerabilities and allow various malicious attack attempts successfully made by hackers.

Buffer overflow -- Hacker may send exceeding amount of information to a field variable in an application in order to cause an application error. The improper error handling of the application as the result of in adequate code reviews may lead to the execution of malicious commands after buffer overflow attack.

SQL injection -- SQL injection is dangerous to any database server behind a web application if there are insufficient input validation mechanisms in place. Hacker may be able to dump, alter, delete or create information in a database by inserting deliberated SQL commands into the input.

Cross-site scripting -- Web forms in the web pages of a web application may have a higher risk of being exploited by cross-site scripting (XSS) threat if malicious command entered into the web form is processed by the web application without being detected by its security function.

Relevant Material

Open Source Vulnerability Database (OSVDB)

Founded in August 2002 at the Black Hat and Defcon conferences, OSVDB was created to provide an independent and Open Source Vulnerability Database. The goal was to provide accurate, detailed, current and unbiased technical information about all types of vulnerabilities.

The project will promote greater, more open collaboration between companies and individuals, eliminate redundant works, and reduce expenses inherent with the development and maintenance of in-house vulnerability databases

See the article: (http://osvdb.org)

Reference:
http://www.eccouncil.org/CEH.htm

 

[Previous section][Next section]

 

 

 

尊龙百家乐赌场娱乐网规则| 威尼斯人娱乐城线上博彩| 百家乐有不有作弊| 金杯百家乐的玩法技巧和规则| 百家乐官网制胜法宝| tt娱乐城备用网| 西游记百家乐娱乐城| 澳门百家乐开户投注| 百家乐官网折桌子| 棋牌娱乐城| 若羌县| 金沙足球投注网| 博彩一族| 现金娱乐城| 曲阜市| 在线真人娱乐城| 线上娱乐网站| 娱乐城注册送金| 怀来县| 百家乐官网玩法和技巧| 康莱德百家乐的玩法技巧和规则| 百家乐U盘下载| 至尊百家乐20111110| 百家乐信誉好的平台| 百家乐币| 太阳百家乐娱乐| 威尼斯人娱乐城老lm0| 大赢家网上娱乐| 至尊百家乐官网规则| 百家乐娱乐网网77scs| 百家乐真人博彩的玩法技巧和规则| 大发888hanpa| 海丰县| 百家乐官网变牌桌| 百家乐美女荷官| 电脑版百家乐下注技巧| 谈大发888风水和运气| 棋牌中心| 至尊百家乐官网年代| 百家乐官网桌布呢布| 网上百家乐赌博网|