Skip to Content
Hands-On Red Team Tactics
book

Hands-On Red Team Tactics

by Himanshu Sharma, Harpreet Singh
September 2018
Intermediate to advanced
480 pages
9h 45m
English
Packt Publishing
Content preview from Hands-On Red Team Tactics

Exploitation

The malware that was delivered to the target is then detonated (executed) on the system which then performs actions instructed (coded into) by the malware. This might include gaining access to the FTP servers using the credentials found in the reconnaissance phase and using those FTP servers as the pivotal point in which to distribute the malware on each and every system on the target network as a software update installer. This phase focuses on the execution of the malware and the exploitation of vulnerable services in the network (if coded into the malware).

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Storytelling with You

Storytelling with You

Cole Nussbaumer Knaflic
The Manager's Path

The Manager's Path

Camille Fournier
Crucial Conversations

Crucial Conversations

Joseph Grenny, Kerry Patterson, Ron McMillan, Al Switzler, Emily Gregory

Publisher Resources

ISBN: 9781788995238Other