Chapter 7. Gaining Access

I l @ ve RuBoard

Gaining access is the most important step in an attack. The first contact is the most critical. It is at this point that the hacker has the most exposure, since it is at this point that he has the least information about the system. He doesn't yet know how well the system is managed, or if there are auditing or trip wires in place to warn the administrators of unauthorized access. He will try to quickly ascertain if the system is well managed or not, preferably before he has actually logged in to it or set off any alarms. This is when you need your best alarms.

If a hacker already has access to the machine, his battle is half won. This is the best time to halt the hacker, before he gets on your machine. Keeping a hacker off of your system is much easier than getting a hacker out of your system.

I l @ ve RuBoard


Halting the Hacker. A Practical Guide to Computer Security
Halting the Hacker: A Practical Guide to Computer Security (2nd Edition)
ISBN: 0130464163
EAN: 2147483647
Year: 2002
Pages: 210

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net