Skip to main content

Look at System Vulnerabilities -13


Once you can see how people can hack into your computer’s security system, you will Be able to figure out what an attacker might want to target on your computer. If you don't know Different vulnerabilities on most computer systems, you can find information about vulnerabilities Database such as

1. US-CERT Vulnerability Description Database (kb.cert.org)

2. Common vulnerabilities and exposures (cve.mitre.org/cve)

3. NIST National Vulnerability Database (nvd.nist.gov)

These websites document all known system vulnerabilities, which will enable you to make the right assessment for your system. Once you are making the assessment, you can use different tools to administer vulnerability management. Depending on what vulnerabilities that you managed to find, you can use the information you found about the system and identify what attack is most likely to happen. These attacks can be done to do the following:

        1. Take a screenshot while opening a confidential file

        2. Access the most valuable or sensitive files

        3. Send a file or email as an administrator

        4. Stop or start an application or service

        5. Get the remote command prompt

        6. Get more in-depth information about hosts and data

        7. Access to other connected systems

        8. Disable security controls or logs

        9. Perform a DoS attack

       10. Do SQL injection

       11. Upload a file of a broadcast attack.

Now you have understood how hackers can detect vulnerabilities in your system and perform possible actions Attack based on the information they found about your network, it’s time to understand how they penetrate through your system’s security. 

Comments

Post a Comment