Before discussing more about privilege escalation, first we must know what is ‘privilege’. Privilege is the level of authority given to user on a specific system or file. Or we can say that privilege is ‘what the user are permitted to do”. For example, a general user doesn’t have the privilege to change the sytem settings on a machine while the administrator have it. Continue Reading
“Vulnerability Assessment” at Glance
Hello Guys,
Lets talk about Vulnerability Assessment.
First, we must know what is Vulnerability. (you can go to this post)
Vulnerability is a weak point/spot of a system that can be attacked/exploited by someone through a series of method and technique to take over the control over the system. There are three types of vulnerability, Hardware Software and Human/Brainware. Continue Reading
“Vulnerability” at Glance
Wikipedia :
“In computer security, a vulnerability is a weakness which allows an attacker to reduce a system’s information assurance. Vulnerability is the intersection of three elements : a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface.” Continue Reading
Hacking Framework
Here’s the phases of hacking/ Hacking Framework :
1. Information Gathering
2. Service Enumeration
3. Vulnerability Assessment
4. Exploitation
5. Backdooring
6. Housekeeping
7. Rootkit/Maintain Access
Lets study these phase one by one. Continue Reading
PenTest at Glance
What is Pentest ??