官术网_书友最值得收藏!

Gaining access

It is in this phase that pen testers try to get a foothold into the company's internal network. Nowadays, spear-phishing seems to a very common and effective way of accomplishing this. A well-crafted spear-phishing campaign can be launched against the company and create a convincing scenario based on the information gathered during the reconnaissance phase.

Gaining access can also include using exploits/credentials on a remote service to log into a system and then execute a payload.

Metasploit and PowerShell Empire can aid in this as they both create payloads, also known as stagers. Once the stager is executed on the target, it runs in memory. This style leaves very little forensic evidence behind. The other case is pushing a binary to the remote system and executing the binary via the command line, which can be equally effective. This approach is faster and doesn't rely on an internet download to be successful.

主站蜘蛛池模板: 抚顺市| 清远市| 嘉义市| 安阳县| 霞浦县| 阳曲县| 府谷县| 广州市| 塘沽区| 聂荣县| 周口市| 汾阳市| 清新县| 正安县| 怀集县| 柳林县| 绥江县| 靖安县| 临洮县| 普兰店市| 绵竹市| 兴隆县| 北宁市| 河南省| 德令哈市| 鄱阳县| 杂多县| 翁牛特旗| 万荣县| 天镇县| 张北县| 屯留县| 邮箱| 乐至县| 习水县| 同心县| 四川省| 通江县| 周口市| 文成县| 松阳县|