system vulnerabilities
Almost all vulnerabilities come from bugs in the implementation of, or misconfigurations of, the OS and/or apps
Rarely, a problem with a protocol itself
Vulnerabilities can lead to:
- Unauthorized access: attacker gains control of the victim’s machine (attacker can log in, read files, and/or make changes to the system)
- Denial of Service against host (attacker can crash the computer, disable services, etc.)
- Denial of Service against network (attack can disrupt routing, flood the network, etc.)