Remote Access vs Local Access

Dear Friends,
This is not a problem , it's a course work (UNIX scenario)....
As part of it I am searching Remote Attacks and find points as

  1. Exploiting a listening service
  2. Routing through Unix system that is providing security between 2 or more networks
  3. User initiated Remote execution attacks
  4. Promiscuous mode attacks

and I am looking "Local Access" methods too ...

Please provide a detailed description of above points.
Waiting for your fast reply

Thnks
Anes:cool:

I repeat: You MUST fill out the Required Template for Homework & Coursework Questions when posting questions in the Homework and Coursework Questions Forum.

Please repost with a completed template. If you continue to refuse to fill out the required template, you will be banned from using this site!