10202221 - Master - Cyber Pandemic Training Book.pdf

Hacking

Hacking falls into 3 distinct groups:

1. Utilizing stolen or brute-forced credentials

2. Exploiting vulnerabilities

3. Utilizing backdoors and Command and Control (C2) functionality Over 80% of hacking breaches involve the use of brute force or lost/stolen credentials. Oftentimes these credentials are used in conjunction with attacks against web applications.

* Statistic from 2020 Data Breach Investigations Report.

17

Made with FlippingBook - Online catalogs