Conclusion
During the course of this book, we have dissected different phases of targeted attacks as discussed below:
• The first phase started with intelligence gathering about the targets. The attackers spend a considerable amount of time collecting information that is beneficial in constructing the attack surface. The attackers search for online social networks and other repositories containing background details of the target. This process is called Open Source Intelligence (OSINT) in which freely available resources on the Internet are queried to extract information to support initial steps in targeted attacks. OSINT should not be confused with Open Source Software (OSS) as these are both different elements. The presence of “Open ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access