Chapter 7. Understanding the Methods and Mindset of the Attacker

Solutions in this chapter:

▪ Information Gathering
▪ Scanning and Probing
▪ Exploiting Weaknesses
▪ Maintaining Access
▪ Covering Tracks
▪ The Incident
Summary
Solutions Fast Track
Frequently Asked Questions

Introduction

The purpose of this chapter is not to turn investigators into hackers. Investigators often live on the opposite end of the spectrum, having to find out how the network was compromised. The best approach to understanding the mindset of a hacker is to think like one. This chapter will provide you with some insight into the typical hacker's attack plan, as well as inform you about some of the tools of his trade. If you understand the methodology of how a hacker attacks a network, ...

Get Cisco Router and Switch Forensics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.