,----[ Quote ]
| "We try to exploit vulnerabilities by sending malformed protocol messages
| to open ports. For example, Code Red exploited a vulnerability in MS IIS
| Web service software. We would exploit the same vulnerability," Brown
| said.
|
| The HPAC team will use hacking techniques to create buffer overflows,
| heap overflows and stack overflows to gain control of clients' systems.
| They will use exploit code for known vulnerabilities published on
| the Internet or write their own.
`----
http://news.com.com/2100-7355_3-6090825.html?part=rss&tag=6090825&subj=news
|
|