December 2018
Intermediate to advanced
318 pages
8h 28m
English
In this final stage of attack, the escalated permissions are used to transfer data out of the network, also known as ex-filtration. They steal sensitive data from the organization and corrupt critical resources. Often, the disruption could also include deleting entire file systems.
Read now
Unlock full access