0days: How hacking really works (37 pages)

a closer curve

Document rating:
  5.0 out of 5
Vote this doc:
background image

A closer curve

Most interesting machines

are owned shortly after
discovery. Discovery rarely

happens by “researchers”
first.

Patch information releases a

lot of information about the

vulnerability.

Upon disclosure, real

hacking stops.

Hackers have access to a lot

more “Internet” than the
average public or a worm

Most vulnerable machines
are on intra-nets

Document rating:
  5.0 out of 5
Vote this doc: