Chapter 1. There Be Hackers Here!
When the ancient mapmakers reached the edge of the known world they wrote on their maps, “There Be Dragons Here!”
This chapter discusses in broad strokes the anatomy of a hacker attack from the beginning steps of finding the right target with recon and enumeration to executing the attack to cleanup. You learn some of the factors and footprints of hackers, enabling you to understand the emerging threats and potential exploits.
By the end of this chapter, you should know and be able to explain the following:
• What are hacker motivations and how are they evolving?
• What is the difference between a target of opportunity and a target of choice?
• What are the major components of an attack and the purpose of each? ...
Get Network Security First-Step, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.