Ways of proceeding:
- Compromise: In this step, the attackers try everyway to attack to trick,put backdoor or trojan in organization's employee who works in the target organizations. They can be: fake mail, fake website, Social Enginering,...
- Establishing a foothold:
- Privileging Escalation:
- Investigating architecture of network:
- Expoiting:
- Maintaining accessibility:
- Finishing mission:
19:38:00
0 nhận xét:
Đăng nhận xét