5. Chained Corporations
Setting the Stage
Chained Corporations
One of the most overlooked security flaws is the one that can’t be measured by looking at one corporation’s network security architecture. It can’t even be measured by the best vulnerability assessment. We’re talking about attacks that originate through one company, and end in the compromise of a peripheral company. We often go to great lengths to secure our networks, tighten our applications, and lock down nodes. But few companies ever stop to look at the infrastructure of the companies they blindly allow access into their network.
Phoenix will orchestrate a complex attack where he will exploit not one but two other companies to finally penetrate his primary target. ...
Get Chained Exploits: Advanced Hacking Attacks from Start to Finish now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.