![]() ![]() ![]() Attack scenario phase 4 - Windows pass-the-hash program to authenticate to another Windows machine on the enterprise internal network. Identify 3 Critical Controls that would deter this attack – explain how6. Attack scenario phase 3 - attacker loads a local privilege escalation exploit program that allows the attacker to jump from the limited privilege user account to full system privileges. Identify 3 Critical Controls that would deter this attack – explain how.5. Attack scenario phase 2 - Attacker uses outbound HTTPS access from victim to attacker. Identify 3 Critical Controls that would deter this attack – explain how.4. Attack scenario phase 1 - Attacker installs programs of the attacker's choosing on the victim machine, using the privileges of the user who ran the browse. Identify 3 Critical Controls that would deter this attack – explain how.3. Attack scenario phase 0 – Attacker places content on unpatched web site. ![]() Provide an example scenario and describe each of these 3 in that context.2. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |