Hacking the Network
Abstract
This chapter covers the many malicious activities an attacker can use to gain access and maintain a foothold in a network. It will also cover various attacks and the thought process an attacker may go through when penetrating your environment.
Keywords
Hacking; Attacks; Network penetration; Social engineering; Vulnerabilities
Scanning the Network for Potential Vulnerabilities
Chapter points
■ Gaining Initial Access
■ Scanning the Network for Potential Vulnerabilities
■ Vulnerabilities and Exploits
■ Softphone Exploits
■ Maintaining Access
Introduction ...
Get Unified Communications Forensics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.