Please enable JavaScript.
Coggle requires JavaScript to display documents.
GAINING ACCESS (Buffer overflow (In computer security and programming, a…
GAINING ACCESS
Weak Access Policies
-
Set a company policy that standardized and specifically assigned level of access to employees based on their work sector
-
Social engineering
-
Ransomware
They usually send an attachment such as “URGENT ACCOUNT INFO” with a file extension of “.PDF.zip” or “.PDF.rar,” which slips by the unsuspecting victim and delivers the payload
-
-
-
-
Buffer overflow
In computer security and programming, a buffer overflow, or buffer overrun, is a bug where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations.
A technically inclined user may exploit stack-based buffer overflows to manipulate the program to their advantage in one of several ways
By overwriting a local variable that is located near the vulnerable buffer on the stack, in order to change the behavior of the program
By overwriting the return address in a stack frame. Once the function returns, execution will resume at the return address as specified by the attacker - usually a user-input filled buffer
-
-
-
Fault Injection@ fuzzing
-
Hackers will try adding a different type of code to try crashing the entire system or try adding a different type of code to try crashing the entire system
Spare some money to hire ‘whitehats’ who can test the security systems by using various fault injection mechanisms
-