You’ve made it this far and now the true fun begins; breaking things or at least thinking of how to break things. From the title of the chapter, we see we’ll be focusing on going on the offensive. But to truly understand how to attack, one must understand why the attack works and how to prevent that attack from occurring. We will illustrate this by splitting the chapter into three sections:
Attack TypesHere we will describe, in a general sense, how the attack works, what it’s meant to do, possible pivot points, and the mechanics of its inner workings.
Stealing DataHow to manipulate the system to remove the data you’ve collected.
SummaryThis is, of course, our closing comments for the chapter and where we ...