Header Ads

Header ADS

A Look at System Vulnerabilities

 


A Look at System Vulnerabilities 

 

Once you are able to see how people can possibly penetrate your computer’s security system, you will be able to figure out what an attacker may want to target on your computer. If you are unaware of the different vulnerabilities on most computer systems, you can find that information on vulnerability databases such as

  1. US-CERT Vulnerability Notes Database (kb.cert.org)
  2. Common Vulnerabilities and Exposures (cve.mitre.org/cve)
  3. NIST National Vulnerability Database (nvd.nist.gov)

These websites document all known system vulnerabilities, which will enable you to make the right assessment for your system. Once you are making the assessment, you can use different tools to administer vulnerability management. Depending on what vulnerabilities that you managed to find, you can use the information you found about the system and identify what attack is most likely to happen. These attacks can be done to do the following:

  1. Capture your screen while you are opening confidential files
  2. Get access to most valuable or sensitive files
  3.  Send files or emails as administrator
  4. Stop or start applications or services
  5. Get a remote command prompt
  6. Gain deeper information about hosts and data
  7. Access other connected systems
  8. Disable security controls or logs
  9. Perform DoS attacks
  10.   Do SQL injection
  11. Upload a file that broadcasts attack

Now that you are aware of how hackers can detect vulnerabilities in your system and perform possible attacks according to the information they found about your network, it’s time for you to know how they penetrate through your system’s security.

No comments

Powered by Blogger.