Chapter 11. Client-side Compromise
In the previous chapterâs examples, an intruder conducted reconnaissance against remote targets, identified services, and attacked them. After gaining access to one system with a vulnerable service, the intruder archived files of interest and exfiltrated them to a remote server. All of this activity took place without the explicit involvement of a user on the Vivianâs Pets network.
This chapter demonstrates a client-side compromiseâone of the other major categories of malicious network activity you are likely to encounter. Although this incident involves remote systems, the intruder does not initiate the ...
Get The Practice of Network Security Monitoring now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.