<<< Modular Capability | Index | Web Exploitation, cont. >>> |
Attackers gain control of a client machine when it visits a malicious Web page.
Most common ia an attack via browser vulnerabilities (drive-by infection)
The attacking code instructs the Web browser to download and execute malicious code -- without the user knowing.
"Stupid user that clicked yes" is no longer the case!
Defence: very important to install any patches as soon as they are released.
<<< Modular Capability | Index | Web Exploitation, cont. >>> |