Difference between revisions of "Attacks"
From MgmtWiki
(→Reference) |
(→Context) |
||
Line 4: | Line 4: | ||
==Context== | ==Context== | ||
In an area where any known [[Vulnerability]] is quickly closed, the best method to discover new only is to simple explore all, or selected high-value, systems that are exposed on the internet. This can be performed by either looking at existing traffic to emulate good traffic, or just brute-force pushing data at systems to see how they respond. | In an area where any known [[Vulnerability]] is quickly closed, the best method to discover new only is to simple explore all, or selected high-value, systems that are exposed on the internet. This can be performed by either looking at existing traffic to emulate good traffic, or just brute-force pushing data at systems to see how they respond. | ||
+ | |||
+ | ==Examples== | ||
+ | |||
+ | * [[Attaks on Privacy]] | ||
==Reference== | ==Reference== |
Latest revision as of 10:48, 13 February 2022
Full Title or Meme
Attacks against an Identity Management system are the most common form attempts to penetrate a protected resource.
Context
In an area where any known Vulnerability is quickly closed, the best method to discover new only is to simple explore all, or selected high-value, systems that are exposed on the internet. This can be performed by either looking at existing traffic to emulate good traffic, or just brute-force pushing data at systems to see how they respond.