Dear Friends,
This is not a problem , it's a course work (UNIX scenario)....
As part of it I am searching Remote Attacks and find points as
1. Exploiting a listening service
2. Routing through Unix system that is providing security between 2 or more networks
3. User initiated Remote execution attacks
4. Promiscuous mode attacks
and I am looking "Local Access" methods too ...
Please provide a detailed description of above points.
Waiting for your fast reply
Thnks
Anes