Executive Summary:
Although the huge amounts of money and the tremendous efforts are made in the field of information security to make secure systems, there are many ways to attack and break through all these security barriers. This is done either through a high knowledge of the system architecture, or by finding the gaps and weaknesses in the existing system. This paper addresses some methods to break and attack the system, and some proposed solutions.
Table of contents:
INTRODUCTION
1. PHYSICAL ATTACK
1.1 USING BOOTABLE (AUTO RUN) CD
1.2 TAKE OUT THE BATTERY TO REMOVE THE PASSWORD OF THE BIOS
1.3 USING THE HARD DISK DRIVE IN ANOTHER COMPUTER
2. SOFTWARE ATTACK
2.1 CRACK SYSTEM PASSWORDS
2.1.1 The locations of Password and their Hashing Functions
2.1.4 Windows
2.1.5 Linux
2.3 DENIAL OF SERVICE – SYN FLOOD