Password Capture
Password Capture,system security
Password Capture,system security
lAnother attack involves password capture
–watching over shoulder as password is entered
–using a trojan horse program to collect
–monitoring an insecure network login
leg. telnet, FTP, web, email
–extracting recorded info after successful login (web history/cache, last number dialed etc)
lUsing valid login/password can impersonate user
lUsers need to be educated to use suitable precautions/countermeasures
0 comments:
Post a Comment