The Cyber Threat The Attack Process
Data Exfiltration can occur anytime and multiple times after exploitation
War driving Network mapping Port scanning Vulnerability scanning
Establishing accounts Backdoors C2
Metasploit (Automated scanning/attack tool)
Scanning
Keeping Access
Attacker attempts to gain access, undermine an application or deny a service
Attacker steals the data and attempts to hide the presence of the breach
Attacker conducts open source investigation to learn about the target
Attacker attempts to maintain access by establishing user accounts, backdoors/C2
Attacker surveys the target to find vulnerabilities
Reconnaissance
Exploitation
Covering Tracks
Manipulating/deleting logs Malicious code
WHOIS lookup DNS interrogation
Undermine an application Deny a service
Firewall, IDS/IPS, Server, OS
Your websites Social media The “GOOGLE Machine”
9
Made with FlippingBook - Online catalogs