Hacking the Network
Abstract
This chapter covers the many malicious activities an attacker can use to gain access and maintain a foothold in a network. It will also cover various attacks and the thought process an attacker may go through when penetrating your environment.
Keywords
Hacking; Attacks; Network penetration; Social engineering; Vulnerabilities
Scanning the Network for Potential Vulnerabilities
Chapter points
■ Gaining Initial Access
■ Scanning the Network for Potential Vulnerabilities
■ Vulnerabilities and Exploits
■ Softphone Exploits
■ Maintaining Access
Introduction ...
Get Unified Communications Forensics now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.