![]() Strictly based on the context in the presentation, it seems what EC-Council is calling a "Shrink Wrap code attack" is just the act of exploiting holes in unpatched or poorly-configured software. Joel does not particularly mention security POV here, though. Is software that will be installed and used by thousands or millions of Or shareware or open source or GNU or whatever - the main point here It may be actually wrapped in cellophane and soldĪt CompUSA, or it may be downloaded over the Internet. Shrinkwrap is software that needs to be used "in the wild" by a large Update: This Joel on Software uses the term "Shrinkwrap code" for general type of software that is produced and distributed massively. (Any good examples? Or stories how it was particularly successful? Or interesting links?) So what is this Shrink Wrap code attack about? Only either with instances of above or with quite useless re-interpretations of it It seems that this exact phrase is somewhat colloquial to C|EH, so Google is flooded Illustrating the main idea (obviously these presentations are not intended for separate Looking at presentation PDF I received at the course, it only cites couple of sentences ![]() Now trying to do some research and refresh the topics, I can't seem to find serious description of this attack type. On my C|EH course I have heard about term "Shrink Wrap Code Attack", but we've only mentioned it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |