Question: Hands On Ethical Hacking and Network Defense 3 rd edition Case Project 8-2: Detecting Unauthorized Applications In conducting a review of the Oss running on
Hands On Ethical Hacking and Network Defense 3rd edition
Case Project 8-2: Detecting Unauthorized Applications
In conducting a review of the Oss running on the Alexander Rocco network, you detect a program that appears to be unauthorized. No one in the department knows how this program got on the Linux computer. The department manager thinks the program was installed before his start date three years ago. When you review the programs source code, you discover that it contains a buffer overflow vulnerability. Based on this information, write a report to the IT manager stating what course of action should be taken and listing recommendations for management.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
