- Hands-On Red Team Tactics
- Himanshu Sharma Harpreet Singh
- 95字
- 2021-08-13 15:36:46
Exploitation
The malware that was delivered to the target is then detonated (executed) on the system which then performs actions instructed (coded into) by the malware. This might include gaining access to the FTP servers using the credentials found in the reconnaissance phase and using those FTP servers as the pivotal point in which to distribute the malware on each and every system on the target network as a software update installer. This phase focuses on the execution of the malware and the exploitation of vulnerable services in the network (if coded into the malware).
推薦閱讀
- Windows 8實戰從入門到精通
- ASP.NET Core 3 框架揭秘(上下冊)
- 軟件開發視頻大講堂:ASP.NET從入門到精通(第4版)
- ASP.NET從入門到精通(第5版)
- 網絡規劃與設計實用教程
- HIS內核設計之道:醫院信息系統規劃設計系統思維
- Dreamweaver+Flash+Photoshop網頁設計從入門到精通(微課精編版)
- PWA實戰:面向下一代的Progressive Web APP
- Adobe XD界面設計與原型制作教程(全彩)
- Instant Edublogs
- 全棧性能測試修煉寶典:JMeter實戰(第2版)
- 阿里云運維架構實踐秘籍
- Ajax 實用技術
- Bootstrap Web設計與開發實戰
- 華為云計算技術與應用