4 Healthy Stalking

Our bouncing servers are silently humming in a datacenter somewhere in Europe. Our attacking infrastructure is eagerly awaiting our first order. Before we unleash the plethora of attack tools that routinely flood the InfoSec Twitter timeline, let’s take a couple of minutes to understand how our target, political consulting firm Gretsch Politico, actually works. What is their business model? Which products and services do they provide? This kind of information will give us a direction to go in and help us narrow down our attack targets. Drawing tangible goals may very well be our first challenge. Their main website (www.gretschpolitico.com) ...

Get How to Hack Like a Ghost now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.