Uncovering infrastructure vulnerabilities
- Uncovering switch weaknesses
- Vulnerabilities in infrastructure support servers
- Network management tool attacks
Attacks against analyzers and IDS
- Identifying Snort IDS bypass attacks
- Corrupting memory and causing Denial of Service
Exposing server vulnerabilities
- Scanning servers: assessing vulnerabilities on your network
- Uploading rogue scripts and file inclusion
- Catching input validation errors
- Performing buffer overflow attacks
- SQL injection
- Cross–Site Scripting (XSS) and cookie theft
Revealing desktop vulnerabilities
- Scanning for desktop vulnerabilities
- Client buffer overflows
- Silent downloading: spyware and adware
- Identifying design errors