Describe the root access method of attacking a firewall.

What will be an ideal response?


This method is used when hackers want to return to a network and manipulate its data by using root or administrative access. A hacker attempts to gain this access by either using a back door to sniff the passwords or by using some other programming code to hijack a session and take control of the administrative sessions. The hacker has either already penetrated the firewall or is using a back door for root access. The hacker installs a rootkit that is used for a variety of purposes, such as password sniffing or injecting Trojans into the network after penetrating the root.

Computer Science & Information Technology

You might also like to view...

What is the output of the following statement? (In this question # signifies a blank space.)

cout << setw (6) << left << “hello” << setw(6) << right << 2.78; a) #hello2.78## b) #hello2.78### c) hello###2.78 d) hello####2.78

Computer Science & Information Technology

The main disadvantage of fiber-opticcabling is _____.

A. ?its slow speed when used to connect networks housed in separate buildings B. ?its susceptibility to interference C. ?the use of metallic fiber strands instead of glass or plastic fiber strands D. ?the initial expense of both the cable and the installation

Computer Science & Information Technology

Which of the Windows PE command-line tools captures and applies Windows images?

a. ImageX b. DiskPart c. Net d. DISM

Computer Science & Information Technology

Token passing networks generally use either collision detection or collision avoidance techniques to deal with potential collisions.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology