官术网_书友最值得收藏!

Exploitation

The malware that was delivered to the target is then detonated (executed) on the system which then performs actions instructed (coded into) by the malware. This might include gaining access to the FTP servers using the credentials found in the reconnaissance phase and using those FTP servers as the pivotal point in which to distribute the malware on each and every system on the target network as a software update installer. This phase focuses on the execution of the malware and the exploitation of vulnerable services in the network (if coded into the malware).

主站蜘蛛池模板: 黄石市| 高青县| 汶川县| 丰原市| 即墨市| 罗山县| 越西县| 灵山县| 宁南县| 平湖市| 秦皇岛市| 东乡族自治县| 大足县| 正安县| 美姑县| 武夷山市| 肃宁县| 岑巩县| 平湖市| 古蔺县| 公主岭市| 保定市| 保康县| 湘阴县| 繁峙县| 陕西省| 新河县| 顺昌县| 普定县| 阿合奇县| 荆门市| 永仁县| 西乌| 泰州市| 赣州市| 湘乡市| 临武县| 修武县| 贡山| 景德镇市| 曲靖市|