Hacking the Network
This chapter covers the many malicious activities an attacker can use to gain access and maintain a foothold in a network. It will also cover various attacks and the thought process an attacker may go through when penetrating your environment.
Hacking; Attacks; Network penetration; Social engineering; Vulnerabilities
■ Gaining Initial Access
■ Scanning the Network for Potential Vulnerabilities
■ Vulnerabilities and Exploits
■ Softphone Exploits
■ Maintaining Access