October 2013
Intermediate to advanced
156 pages
3h 37m
English
This chapter covers the many malicious activities an attacker can use to gain access and maintain a foothold in a network. It will also cover various attacks and the thought process an attacker may go through when penetrating your environment.
Hacking; Attacks; Network penetration; Social engineering; Vulnerabilities
Scanning the Network for Potential Vulnerabilities
■ Gaining Initial Access
■ Scanning the Network for Potential Vulnerabilities
■ Vulnerabilities and Exploits
■ Softphone Exploits
■ Maintaining Access