from book:
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking | |
John Wiley & Sons © 2008 |
active: just evastroping (like sniffing or monitoring)
passive: probes networks t get OS and available services)
Scanning
nmap
Nessues
nikto/wikto
Acutenix
AppScan
Acquiring Access
denial of service attacks, buffer overflow attacks, and application-based attacks
Maintaining Access
Covering tracks
'Hacking' 카테고리의 다른 글
Changing Start Button text in Win XP (0) | 2008.09.22 |
---|---|
Changing your Windows Login Screen During startup (0) | 2008.09.22 |
CEH (Certified Ethical Hacker) Terminology and Hacking History (0) | 2008.09.21 |
Known DLL (kernel32.dll, user32.dll and gdi32.dll) (1) | 2008.09.19 |
Intercepted! Windows Hacking via DLL Redirection (0) | 2008.09.19 |