10202221 - Master - Cyber Pandemic Training Book.pdf

The Cyber Threat The Attack Process

Data Exfiltration can occur anytime and multiple times after exploitation

War driving Network mapping Port scanning Vulnerability scanning

Establishing accounts Backdoors C2

Metasploit (Automated scanning/attack tool)

Scanning

Keeping Access

Attacker attempts to gain access, undermine an application or deny a service

Attacker steals the data and attempts to hide the presence of the breach

Attacker conducts open source investigation to learn about the target

Attacker attempts to maintain access by establishing user accounts, backdoors/C2

Attacker surveys the target to find vulnerabilities

Reconnaissance

Exploitation

Covering Tracks

Manipulating/deleting logs Malicious code

WHOIS lookup DNS interrogation

Undermine an application Deny a service

Firewall, IDS/IPS, Server, OS

Your websites Social media The “GOOGLE Machine”

9

Made with FlippingBook - Online catalogs