Difference between revisions of "Attacks"
From MgmtWiki
(→Context) |
(→Reference) |
||
| (One intermediate revision by the same user not shown) | |||
| Line 1: | Line 1: | ||
==Full Title or Meme== | ==Full Title or Meme== | ||
[[Attacks]] against an [[Identity Management]] system are the most common form attempts to penetrate a protected resource. | [[Attacks]] against an [[Identity Management]] system are the most common form attempts to penetrate a protected resource. | ||
| + | |||
| + | Note that the wiki page [[Attack]] details some of theoretical aspects of defending against [[Attacks]]. | ||
==Context== | ==Context== | ||
| Line 12: | Line 14: | ||
[[Category: Glossary]] | [[Category: Glossary]] | ||
| + | [[Category: Attack]] | ||
[[Category: Vulnerability]] | [[Category: Vulnerability]] | ||
Latest revision as of 14:42, 19 January 2024
Full Title or Meme
Attacks against an Identity Management system are the most common form attempts to penetrate a protected resource.
Note that the wiki page Attack details some of theoretical aspects of defending against Attacks.
Context
In an area where any known Vulnerability is quickly closed, the best method to discover new only is to simple explore all, or selected high-value, systems that are exposed on the internet. This can be performed by either looking at existing traffic to emulate good traffic, or just brute-force pushing data at systems to see how they respond.