Case Project 8-2: Detecting Unauthorized Applications
In conducting a review of the Oss running on the Alexander Rocco network, you detect a program that appears to be unauthorized. No one in the department knows how this program got on the Linux computer. The department manager thinks the program was installed before his start date three years ago. When you review the program’s source code, you discover that it contains a buffer overflow vulnerability. Based on this information, write a report to the IT manager stating what course of action should be taken and listing recommendations for management.
Your essay should be a minimum of 350 words and include the steps you took to discover file.
Simpson, M. T., Backman, K., & Corley, J. (2011). Hands-on ethical hacking and network defense. Cengage Learning.
Add any other recent references