From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Recognizing common vulnerabilities

Recognizing common vulnerabilities

- [Instructor] A vulnerability is a security flaw in a system that can be exploited by a threat to gain unauthorized access to an asset or modify system integrity. In this segment, we'll take a look at common vulnerabilities that exist in multiple areas. First, let's talk about attack vectors and attack surfaces. To gain access to a system, malicious actors use an attack vector, such as social engineering or malware. An attack surface is the total number of attack vectors a malicious actor can use to gain access to a system. Today's organizations are large, complex, and have many attack surfaces that include software, the user, and the network. Let's talk about a few attack surfaces, starting with software. Software represents the largest attack surface and includes applications, services, executables, and webpages. We find software vulnerabilities in all types of software in operating systems. Attacks include buffer overflows, SQL injection, or other attacks that take advantage of…

Contents