Difference between revisions of "Attacks"
From MgmtWiki
(→Reference) |
(→Context) |
||
| Line 4: | Line 4: | ||
==Context== | ==Context== | ||
In an area where any known [[Vulnerability]] is quickly closed, the best method to discover new only is to simple explore all, or selected high-value, systems that are exposed on the internet. This can be performed by either looking at existing traffic to emulate good traffic, or just brute-force pushing data at systems to see how they respond. | In an area where any known [[Vulnerability]] is quickly closed, the best method to discover new only is to simple explore all, or selected high-value, systems that are exposed on the internet. This can be performed by either looking at existing traffic to emulate good traffic, or just brute-force pushing data at systems to see how they respond. | ||
| + | |||
| + | ==Examples== | ||
| + | |||
| + | * [[Attaks on Privacy]] | ||
==Reference== | ==Reference== | ||
Revision as of 09:48, 13 February 2022
Full Title or Meme
Attacks against an Identity Management system are the most common form attempts to penetrate a protected resource.
Context
In an area where any known Vulnerability is quickly closed, the best method to discover new only is to simple explore all, or selected high-value, systems that are exposed on the internet. This can be performed by either looking at existing traffic to emulate good traffic, or just brute-force pushing data at systems to see how they respond.