官术网_书友最值得收藏!

Exploitation

The malware that was delivered to the target is then detonated (executed) on the system which then performs actions instructed (coded into) by the malware. This might include gaining access to the FTP servers using the credentials found in the reconnaissance phase and using those FTP servers as the pivotal point in which to distribute the malware on each and every system on the target network as a software update installer. This phase focuses on the execution of the malware and the exploitation of vulnerable services in the network (if coded into the malware).

主站蜘蛛池模板: 梅河口市| 巴林右旗| 邯郸市| 新晃| 康平县| 宁武县| 楚雄市| 台湾省| 岗巴县| 诸暨市| 邯郸市| 宁城县| 广宁县| 土默特左旗| 内丘县| 息烽县| 桐庐县| 赤城县| 黄浦区| 白河县| 巴彦淖尔市| 北京市| 新竹市| 宁安市| 新巴尔虎右旗| 长汀县| 杨浦区| 望都县| 池州市| 广州市| 木里| 柯坪县| 武胜县| 呼玛县| 左云县| 克东县| 安远县| 乐平市| 成都市| 镇沅| 元谋县|