Creating vulnerabilities to compromise systems
We discussed how attackers compromise systems and steal personal data. This can be done in multiple ways; launching an attack and compromising the system is one of the ways that attackers steal your data. To launch an attack, there must be three components to be fulfilled.
They are as follows:
- Vulnerable system
- Exploit for the recovered vulnerability
- The motivation of the attacker
Vulnerable system
The definition of a vulnerable system is a system with existing weaknesses. This is not only an operating system. There can be different layers of the system that can be vulnerable. It can be an operating system or installed applications, in which the procedures may allow for creating vulnerability, and the protocols used can be vulnerable. This can be recovered by vulnerability assessment. During vulnerability assessment, testers will try to understand whether the targeted system has any known vulnerability. Testers...