官术网_书友最值得收藏!

Gaining access

It is in this phase that pen testers try to get a foothold into the company's internal network. Nowadays, spear-phishing seems to a very common and effective way of accomplishing this. A well-crafted spear-phishing campaign can be launched against the company and create a convincing scenario based on the information gathered during the reconnaissance phase.

Gaining access can also include using exploits/credentials on a remote service to log into a system and then execute a payload.

Metasploit and PowerShell Empire can aid in this as they both create payloads, also known as stagers. Once the stager is executed on the target, it runs in memory. This style leaves very little forensic evidence behind. The other case is pushing a binary to the remote system and executing the binary via the command line, which can be equally effective. This approach is faster and doesn't rely on an internet download to be successful.

主站蜘蛛池模板: 武汉市| 白朗县| 浦江县| 衡南县| 牙克石市| 永昌县| 夏邑县| 邹城市| 建德市| 香港| 武强县| 新平| 新乡县| 大港区| 岳池县| 专栏| 志丹县| 三江| 长宁区| 上饶市| 常宁市| 武义县| 商城县| 渝北区| 循化| 富宁县| 收藏| 四子王旗| 卢湾区| 红桥区| 维西| 同仁县| 绥江县| 赤水市| 枣庄市| 定南县| 桐庐县| 铜鼓县| 肥西县| 油尖旺区| 叶城县|