*nix-Based Attack

Common *nix Attack Techniques

Commonalities Among *nix-Based Vulnerabilities The *nix-based operating systems all have their roots in Unix. Besides the various forms of Unix itself, this OS family includes Linux, Android, macOS (and its BSD-based predecessors), iPhone iOS, and others. Vulnerabilities for *nix-based operating systems have the following commonalities: As a pen tester, you will use the same methodologies […]

Windows Attack

Common Windows Attack Techniques

Commonalities Among Windows-Based Vulnerabilities All common operating systems, regardless of vendor or platform, have vulnerabilities. Although APTs and nation-state actors might keep vulnerabilities they discover to themselves, most vulnerabilities are well-documented with exploits that are available to the public. On any particular platform, many vulnerabilities have common traits. Vulnerabilities for Windows-based operating systems have the […]

Attack

Specialized Systems

Mobile Devices Mobile devices, particularly smartphones and tablets, are an important tool in many organizations. In today’s world, an employee’s mobile device might be just as attractive to an attacker because it can hold sensitive company data and private personal data, not to mention its usefulness as an authentication mechanism. Therefore, it may be in […]