First page Back Continue Last page Summary Graphic
A Survey of Vulnerability and Attacks
Buffer Overflows
- Failure to bound a read buffer in a program may allow exploitation of the system by writing into the system memory allocated by the read buffer.
Scanning and Sniffing
- Network scanning may allow an attacker to identify the OS running on the system as well as daemons available.
Spoofing
- A user pretending to be another user, a host another host, an IP address another IP address, etc...