tailieunhanh - Module 06 Enumeration
An enumeration of a collection of items is a complete, ordered listing of all of the items in that collection. The term is commonly used in mathematics and theoretical computer science to refer to a listing of all of the elements of a se | -M c IH Certified Ethical Hacker Ethical Hacking and Countermeasures Version 6 Module VI Enumeration TM c EH Scenario Certified Ethical Hacker Dennis has just joined a Security Sciences Certification program. During his research on organizational security Dennis came through the term enumeration. While reading about enumeration a wild thought flashed in his mind. Back home he searched over the Internet for enumeration tools. He downloaded several enumeration tools and stored them in a flash memory. Next day in his library when nobody was around he ran enumeration tools across library intranet. He got user names of several library systems and fortunately one among them was the user name used by one of his friends who was a premium member of the library. Now it was easy for Dennis to socially engineer his friend to extract his password. How will Dennis extract his friend s password What kind of information Dennis can extract EC-Council Copyright by Ec-Council All Rights Reserved. Reproduction is Strictly Prohibited TM c E H News Certified Ethical Hacker xl p Associated Press Goto Google News Computer Memory Vulnerable to Hacking By JORDAN ROBERTSON - 3 lays ago SAN FRANCISCO AP Want to break into a computer s encrypted hard drive Just blast the machine s memory chip with a burst of cold air. That s the conclusion of new research out of Princeton University demonstrating a novel low-tech way hackers can access even the most well-protected computers provided they have physical access to the machines. The Princeton report shows how encryption long considered a vital shield against hacker attacks can be defeated by manipulating the way memory chips work. The researchers say the ease of their attack raises fears about the security of laptop computers increasingly used to store sensitive information from personal banking data to company trade secrets to national security documents. Freezing a dynamic random access memory or DRAM chip the most common type of memory chip in
đang nạp các trang xem trước