Summary

Summary

A skilled hacker can locate buffer overflow conditions in programs and use them to compromise systems. Although the techniques discussed in this chapter focus on staged vulnerabilities in programs in a lab, they just as easily can be used to find vulnerabilities in commercial applications. Many hackers have done this in the past.

The message of this chapter warrants serious consideration. The message is that, even with all the security controls, procedures, patches, and fixes that you might use, you are still vulnerable without software such as Entercept (http://www.entercept.com) that can prevent such attacks.

 



Web Hacking(c) Attacks and Defense
Web Hacking: Attacks and Defense
ISBN: 0201761769
EAN: 2147483647
Year: 2005
Pages: 156

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net