官术网_书友最值得收藏!

Exploitation

The malware that was delivered to the target is then detonated (executed) on the system which then performs actions instructed (coded into) by the malware. This might include gaining access to the FTP servers using the credentials found in the reconnaissance phase and using those FTP servers as the pivotal point in which to distribute the malware on each and every system on the target network as a software update installer. This phase focuses on the execution of the malware and the exploitation of vulnerable services in the network (if coded into the malware).

主站蜘蛛池模板: 呼图壁县| 伊宁市| 锦屏县| 申扎县| 平谷区| 翁牛特旗| 西充县| 尼勒克县| 边坝县| 台南市| 远安县| 宜君县| 永顺县| 弋阳县| 南开区| 界首市| 兖州市| 兴国县| 锦屏县| 运城市| 湛江市| 井研县| 霍邱县| 丰宁| 刚察县| 扎赉特旗| 鄯善县| 安顺市| 定远县| 西平县| 大新县| 天全县| 阳春市| 成安县| 台南县| 贵溪市| 吉安县| 高淳县| 长寿区| 当阳市| 禄丰县|