Compromising the System

The previous chapter gave you an idea of the precursors prior to an attack. It discussed tools and techniques used to gather information about a target so that an attack can be planned and executed. It also touched on the external and internal reconnaissance techniques that are utilized in this preliminary phase. This chapter will discuss how actual attacks are conducted after information about the target is collected in the reconnaissance phase. Once the reconnaissance stage is over, the attackers will have useful information about a target, which will aid their attempts to compromise the system. In this stage, different hacking tools and techniques are used to breach targeted systems. The objectives for doing this ...

Get Cybersecurity – Attack and Defense Strategies - Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.