6

Compromising the System

The previous chapter gave you an idea of the precursors prior to an attack. It discussed tools and techniques used to gather information about a target so that an attack can be planned and executed. It also touched on the external and internal reconnaissance techniques that are utilized in this preliminary phase. This chapter will discuss how actual attacks are conducted after information about the target is collected in the reconnaissance phase. Once the reconnaissance stage is over, the attackers will have useful information about a target, which will aid their attempts to compromise the system. In this stage, different hacking tools and techniques are used to breach targeted systems. The objectives for doing this ...

Get Cybersecurity – Attack and Defense Strategies - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.