Red Teaming
In the first half of this Chapter, we went over the steps that an attacker would perform, but we went over each step independently. What makes these steps so powerful is when you combine them together to see the end result. To help illustrate this, we will go through an example of how a hacker would perform this type of attack against your company. Because the real interest is for you to understand it, so you can perform it against your company with the goal of securing your system, we will call in a red team exercise. We will also look at what can be done to minimize the amount of information someone can gather from your site. To do this, each step will be followed by a section called “Protection”, which will tell you what can be ...
Get Hackers Beware now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.